Recherche Images Maps Play YouTube Actualités Gmail Drive Plus »
Connexion
Les utilisateurs de lecteurs d'écran peuvent cliquer sur ce lien pour activer le mode d'accessibilité. Celui-ci propose les mêmes fonctionnalités principales, mais il est optimisé pour votre lecteur d'écran.

Brevets

  1. Recherche avancée dans les brevets
Numéro de publicationUS5436957 A
Type de publicationOctroi
Numéro de demandeUS 08/336,700
Date de publication25 juil. 1995
Date de dépôt7 nov. 1994
Date de priorité24 déc. 1992
État de paiement des fraisPayé
Numéro de publication08336700, 336700, US 5436957 A, US 5436957A, US-A-5436957, US5436957 A, US5436957A
InventeursVon K. McConnell
Cessionnaire d'origineBell Atlantic Network Services, Inc.
Exporter la citationBiBTeX, EndNote, RefMan
Liens externes: USPTO, Cession USPTO, Espacenet
Subscriber control of access restrictions on a plurality of the subscriber's telephone lines
US 5436957 A
Résumé
A subscriber inputs data into a centralized database of the public switched telephone network to control communication services which the network provides via a number of telephone lines assigned to the subscriber. The subscriber offers the communication service over the lines to selected ones of the subscriber's own customers. The input data may relate to a variety of different parameters for use in controlling the service. For example, the data may identify specific lines, define periods of time when service should be available, define authorization codes, establish restriction on what types of calls can be made or specify parameters for controlling the routing of the calls over specific trunks groups, or the like. The subscriber can thereby limit the time service is available, can control which customers can use the communication service, can restrict what types of calls the customers can make or can control the telephone network to route calls over the subscriber's private facilities.
Images(7)
Previous page
Next page
Revendications(28)
I claim:
1. A telephone communication system comprising:
a plurality of telephone switching offices for selectively providing switched communication services to a plurality of subscriber telephone lines connected thereto;
a central control separate from the plurality of telephone switching offices, said central control sending data to and receiving data from one or more of the telephone switching offices, to control at least some switching operations thereof;
a group of subscriber telephone lines connected to at least one of the telephone switching offices, all said subscriber telephone lines of said group being assigned to one subscriber;
means for remotely programing information sent from a subscriber telephone line via a common channel interoffice signaling lines to said central control by the subscriber specifying a period of time and an authorization code for comparison to data entered by said callers; and
a database in the central control for storing the received information, said means for remotely programming comprising means for inputting said subscriber information to said data base and means for setting a trigger in each telephone switching office associated with each subscriber telephone line of said group in accordance with said information programmed by said subscriber,
wherein when a caller attempts to obtain a communication service over one of the subscriber telephone lines in said group:
a telephone switching office connected to the one subscriber telephone line accepts input information from the caller and transmits the input information from the caller to the central control,
the central control accesses the information stored in the database to determine if the attempt to obtain a communication service occurred during said period of time and if the input information from the caller includes the authorization code,
the central control instructs the telephone switching office connected to the one subscriber telephone line to provide a switched telephone communication service over the one subscriber telephone line if the attempt to obtain service occurred during the period and if the input information from the caller includes the authorization code.
2. A telephone communication system as in claim 1, wherein said means for remotely programming further comprises:
means for providing prompts over a telephone line to the subscriber;
means for receiving Dual Tone Multi-Frequency (DTMF) signals representative of data inputs dialed in on a keypad by the subscriber; and
means for transferring the data inputs to the database for storage therein.
3. A telephone communication system as in claim 1, wherein said means for remotely programming further comprises:
one of the telephone switching offices being responsive to dialing of a predetermined telephone number to receive DTMF input signals over a telephone line, said DTMF signals representing data identifying the period of time and the authorization code, wherein said one of the telephone switching offices transfers the data to the central control.
4. A telephone communication system as in claim 1, wherein said means for remotely programming comprises:
an interactive voice response unit for providing prompts and for transmitting and receiving Dual Tone Multi-Frequency (DTMF) signals; and
a telephone line connecting the interactive voice response unit to one of the telephone switching offices, wherein:
the one telephone switching office connects a call to the telephone line to the interactive voice response unit in response to dialing of a first predetermined telephone number by the calling party, when connected, the interactive voice response unit sends prompts to a calling party and receives DTMF signals representing information identifying the period of time and the authorization code from the calling party, and
after the call is disconnected from the telephone line to the interactive voice response unit, the one telephone switching office is responsive to input of a second predetermined telephone number by the interactive voice response unit to receive DTMF input signals from the interactive voice response unit representing data identifying the period of time and the authorization code, wherein said one of the telephone switching offices transfers the received data to the central control.
5. A telephone communication system as in claim 1, wherein said means for remotely programming further comprise means for receiving data communications signals from a data terminal.
6. A telephone communication system as in claim 1, wherein said central control is an Integrated Service Control Point (ISCP) and the switching office connected to the one telephone line is a Service Switching Point (SSP), said system further comprising means for communicating data between the SSP and the ISCP.
7. A method of controlling provision of communication services over an identified group of subscriber telephone lines assigned to one subscriber, said subscriber telephones lines connecting to a public switched telephone network, said method comprising:
remotely programing into a centralized data base information sent from a subscriber telephone line via common channel interoffice signaling line to said central control by the subscriber identifying a period of time when the communication services provided over the group of subscriber telephone lines should be active and an authorization code;
storing the received information in the centralized database within the public telephone switched network and setting a trigger in each telephone switching office associated with each subscriber telephone line of said group in accordance with said information programmed by said subscriber;
detecting an attempt to initiate a call on one of the lines of the group:
receiving information from a caller on the one line of the group; and
providing a connection from the one line of the group to a destination telephone only if the attempt to initiate a call was detected within the period and the information from the caller includes information corresponding to the authorization code.
8. A method as in claim 7, wherein the authorization code comprises a code identifying a product or service offered by the subscriber and a password, said method further comprising the steps of:
comparing a first predetermined portion of said information from the caller with the code identifying a product or service; and
comparing a second predetermined portion of said information from the caller with the password,
wherein the information from the caller corresponds to the authorization code only if the first predetermined portion matches the code identifying a product or service and the first predetermined portion matches said password.
9. A method as in claim 7, wherein the step of providing a connection comprises routing the connection over trunk facilities identified by information stored in the centralized database.
10. A method as in claim 9, further comprising the step of receiving from the subscriber information identifying trunk facilities, and storing the information identifying trunk facilities in the centralized database for subsequent use in routing the connection.
11. A method as in claim 10, wherein the information identifying a period of time and an authorization code and the information identifying trunk facilities are received from the subscriber via a telephone line.
12. A method as in claim 7, wherein the information identifying a period of time and an authorization code is received from the subscriber via a telephone line.
13. A telecommunication system comprising:
a plurality of switching offices for selectively providing switched communication services to a plurality of communication lines connected thereto;
a central control separate from the plurality of switching offices, said central control sending data to and receiving data from one or more of the switching offices to control at least some switching operations thereof;
a group of communication lines connected to at least one of the switching offices, all of said group of communication lines being assigned to one subscriber;
means for remotely programming information sent from a subscriber telephone line via a common channel interoffice signaling line to said central control by the subscriber, specifying criteria under which the subscriber wishes to offer communication services over the group of lines to one or more of the subscriber's customers; and
means for storing the programmed information in a database in the central control, and means for setting a trigger in each telephone switching office associated with each subscriber telephone line of said group in accordance with said information programmed by said subscriber,
wherein when a caller attempts to obtain a communication service over one of the communication lines in said group:
a switching office connected to the one communication line transmits information characterizing the attempt to obtain a communication service to the central control,
the central control accesses the information defining criteria stored in the database and instructs the switching office connected to the one communication line to provide switched communication service over the one line if the information characterizing the attempt to obtain a communication service meets the criteria.
14. A method of controlling provision of communication services over an identified group of communication lines assigned to one subscriber, said communication lines connecting to a switched communication network having a plurality of switching offices, said method comprising:
remotely programming into a central data base sent from a subscriber telephone line via a common channel interoffice signaling line to said central control by the one subscriber, information defining criteria under which the one subscriber wishes to offer communication services over the group of lines to one or more persons;
storing the programmed information in a centralized database in the switched communication network separate from the plurality of switching offices and setting a trigger in each telephone switching office associated with each subscriber telephone line of said group in accordance with said information programmed by said subscriber;
detecting an attempt by one of the persons to obtain a communication service over one of the communication lines in said group;
transmitting information characterizing the attempt to obtain a communication service from a switching office connected to the one communication line to the centralized database;
accessing the information defining criteria stored in the centralized database; and
providing a communication service on said one of the lines of the group if the information characterizing the attempt to obtain a communication service meets the criteria.
15. A method as in claim 14, wherein:
the criteria includes an authorization code;
the information characterizing the attempt to obtain a communication service includes information input by the one person; and
communication service is provided on said one of the lines of the group if the information input by the one person includes the authorization code.
16. A method as in claim 15, wherein the authorization code comprises a code identifying a product or service offered by the subscriber and a password, said method further comprising the steps of:
comparing a first predetermined portion of said information input by the one person with the code identifying a product or service; and
comparing a second predetermined portion of said information input by the caller with the password,
wherein the information input by the caller corresponds to the authorization code only if the first predetermined portion matches the code identifying a product or service and the second predetermined portion matches said password.
17. A method as in claim 15, wherein information defining the authorization code is received from the subscriber via a communication line connected to one of the switching offices.
18. A method as in claim 14, wherein the communication service is provided on said one of the lines of the group when the criteria indicates that service is active when the one person attempts to obtain a communication service.
19. A method as in claim 18, wherein criteria indicates that service is active by defining a period of time, and the communication service is provided on said one of the lines of the group when the attempt to obtain a communication service is detected during said period of time.
20. A method as in claim 14, wherein the switched communication network comprises a public switched telephone network, the lines of the group are telephone lines, and the step of providing a communication service comprises providing a switched telephone call connection from the one of the lines of the group to a destination telephone line.
21. A method as in claim 20, wherein the criteria identifies certain types of telephone calls which the subscriber wants to permit.
22. A method as in claim 20, wherein the step of providing a switched telephone call connection comprises routing the connection over trunk facilities identified by information stored in the centralized database.
23. A method as in claim 22, further comprising the step of receiving from the subscriber information identifying trunk facilities, and storing the information identifying trunk facilities in the centralized database for subsequent use in routing the connection.
24. A method as in claim 23, wherein the information identifying trunk facilities is received from the subscriber via a telephone line.
25. A method as in claim 14, wherein the information defining criteria is received from the subscriber via a communication line connected to one of the switching offices.
26. A method as in claim 14, wherein:
the criteria includes a code identifying a product or service offered by the subscriber, a password and information defining a period of time during which service should be active;
the information characterizing the attempt to obtain a communication service includes information input by the one person and a time at which the attempt was made, said method further comprising the steps of:
comparing a first predetermined portion of said information input by the one person with the code identifying a product or service;
comparing a second predetermined portion of said information input by the one person with the password; and
comparing the time at which the attempt was made with the period of time during which service should be active, wherein
communication service is provided on said one of the lines of the group if the first predetermined portion matches the code identifying a product or service, the second predetermined portion matches said password and the time at which the attempt was made is within the period of time during which service should be active.
27. A method as in claim 26, wherein the criteria also identifies certain types of communication service the subscriber wants to permit and the communication service is provided on said one of the lines of the group if the subscriber requests a type of communication service which the subscriber wants to permit.
28. A method as in claim 26, wherein the step of providing a communication service comprises providing a communication link over trunk facilities identified by information stored in the centralized database.
Description

This application is a continuation of application Ser. No. 07/996,538 filed Dec. 24, 1992, now abandoned.

TECHNICAL FIELD

The present invention relates to methods and system structures which will permit a commercial telephone subscriber to offer its customer's access to telephone services over a group of the subscriber's lines on a basis controlled by the subscriber. More specifically, the present invention permits the subscriber to turn on and off telephone service on the group of lines and to establish access authorization codes which the subscriber can give to its customer's to control their use of the group of lines, to restrictions on the types of calls the customers can make, and/or control how the calls will be routed.

ACRONYMS

The written description uses a large number of acronyms to refer to various services and system components. Although known, use of several of these acronyms is not strictly standardized in the art. For purposes of this discussion, acronyms therefore will be defined as follows:

Advanced Intelligent Network (AIN)

Automatic Number Identification (ANI)

Common Channel Inter-office Signalling (CCIS)

Data and Reporting System (D&RS)

Dual Tone Multi-Frequency (DTMF)

Integrated Service Control Point (ISCP)

Interactive Voice Response (IVR) unit

Local Access and Transport Area (LATA)

Service Circuit Node (SCN)

Service Control Point (SCP)

Service Management System (SMS)

Service Switching Point (SSP)

Signaling System Seven (SS#7)

Signaling Transfer Point (STP)

Station Message Detail Recording (SMDR)

Service Creation Environment (SCE)

Transaction Capabilities Applications Protocol (TCAP)

BACKGROUND ART

In recent years a number of Intelligent Network type telephone system architectures have been developed to provide and control a variety of communication services from a centralized database within the telephone network. In such a system, the central database controls switching operations through multiple end offices. Local and/or toll offices of the public telephone network detect a call processing event identified as an AIN "trigger". For ordinary telephone service calls, there would be no event to trigger AIN processing; and the local and toll office switches would function normally and process such calls without referring to the database for instructions. An office which detects a trigger, however, will suspend call processing, compile a call data message and forward that message via a common channel interoffice signalling (CCIS) link to a Service Control Point (SCP) which includes the database. If needed, the SCP can instruct the central office to obtain and forward additional information. Once sufficient information about the call has reached the SCP, the SCP accesses its stored data tables to translate the received message data into a call control message and returns the call control message to the office of the network via CCIS link. The network offices then use the call control message to complete the particular call.

Pierce et al., "Meeting Private Needs with the Public Network", BELLCORE EXCHANGE, January/February 1988, pp. 8-13, is one example of a disclosure of an intelligent network architecture which includes a description of the variety of communication services which such a network can offer. As disclosed therein, the network identifies a number of lines for a commercial subscriber as members of a closed group, referred to as a private virtual network, even though those lines connect to a number of different local switching offices. The system then uses subscriber data stored in the SCP to control the end offices to offer services such as routing control, class of service restriction and corresponding access authorization to override the restriction, and a telecommuting service whereby services available on a subscriber business line may also be available on the subscriber's home line. The customer can also change the programming in the SCP so that when an employee moves, the network number used to reach that person stays the same even though that person is assigned a new public-network directory number. Pierce et al. further suggest that the intelligent network can provide a closely related " Area Wide Centrex" service offering additional features, such as call transfer, to a closed user group.

Although such intelligent network systems offer commercial subscribers considerable flexibility in customizing their telephone services, they have not as yet offered such subscriber's as much control over availability of services and/or access restrictions for such services. In one example, an airline operating a courtesy lounge might want to activate phone service via telephones in the lounge and offer that service to passengers on a delayed flight. It would be desireable, however, to control the service carefully to avoid abuse. Some access control has been provided by the telephone network, including the systems using intelligent network architectures, however, they do not offer the subscriber sufficient direct access to the data in the SCP or the flexibility to control authorization codes, to efficiently provide the control necessary for the airline courtesy lounge example.

For example, U.S. Pat. No. 4,756,020 to Fodale suggests access authorization control in an AIN type multiple office environment. The Fodale system however, restricts access to a long distance telephone network based on the status of the billing number associated with the call, i.e. delinquent. In the Fodale network, the information in the database can not be modified by the customer and does not activate or deactivate service to one subscriber's identified group of lines. Also, Fodale does not suggest storing any authorization code or password data in the database.

U.S. Pat. No. 4,313,035 to Jordan et al. patent discloses a method of providing a person locator service through multiple exchanges of the switched telephone network using an intelligent network type of telephone system architecture. Jordan et al. teach offering the subscriber access to the subscriber's data in the central database, to input data for controlling the person locator service. The Jordan et al. system, however, does not activate service provided via a group of the subscriber's telephone lines and does not allow the subscriber to establish codes or passwords to control access to the activated service.

U.S. Pat. No. 5,109,408 to Greenspan et al. discloses a telephone communication system for blocking calls to certain types of telephone numbers, typically 900 or 976 numbers. In response to such a call, the local switching office launches a query to the database, and the database returns a response message instructing the switch as to how to process the call. The response can instruct the switch to play an announcement and collect digits, terminate the call, connect the call to a translated destination number or connect the call to a dialed destination number. In one example given, the switch is configured to block all 976 calls, but the switch will query the database regarding override under certain circumstances. To override a call block, the subscriber goes off-hook, dials an access code and a 976 directory number. In response, the switch launches the query to the database. The database checks the customer's data file. If the customer has requested completion under such circumstances, the database sends back an instruction to the switch to complete the call to the dialed 976 directory number. If the subscriber's data indicates that the subscriber has requested a screening procedure, the database would send back an instruction to play an announcement and collect additional digits, e.g. corresponding to the subscriber's personal identification number. In this second case, the database sends the call completion instruction only after the caller has passed the screening procedure specified by the subscriber. Greenspan et al. however, do not allow one subscriber to control outdialing services on a plurality of the subscribers lines and do not allow the subscriber to change the subscriber's data during an interactive call-in procedure.

U.S. Pat. No. 4,896,346 to Belfield et al. discloses an automated telephone switching system which provides restricted access to a subscriber's trunk facilities using an authorization code and a spoken password to identify persons permitted access. Also, the subscriber can enter the password in the database within the telephone network using an interactive procedure. Belfield et al., however, do not allow the subscriber to establish different authorization codes, particularly codes which relate to the subscriber's products or services.

From the above discussion it becomes clear that a need still exists to offer subscriber's greater control over activation of services and related restrictions to services, so that subscribers can in turn offer those services to their own customer's on a carefully restricted basis. The subscriber should be able to turn on the service for a group of the subscriber's lines at will, without intervention by telephone company personnel. The subscriber should also have the ability to easily establish authorization codes for use in accessing such services, so that the subscriber can give the codes only to those customer's to whom it wishes to offer access to the communications services. The subscriber should also be able to control routing of calls through the network to minimize costs and/or optimize use of the subscriber's own private facilities.

DISCLOSURE OF THE INVENTION

The present invention meets the above discussed needs by using an Advanced Intelligent Network (AIN) type communication system architecture. A central database in an Integrated Service Control Point (ISCP) controls the switching operations through multiple end offices of the network. The present invention allows a, commercial subscriber to interact with a database maintained in the ISCP, to establish and modify various criteria to activate and/or restrict communication services provided on a group of the subscriber's telephone lines.

As used throughout the description of the present invention, the term "subscriber" refers to an entity which purchases communication services from a Telephone Company or other common communication carrier. A commercial subscriber will typically offer for sale one or more products or services, which may not relate to communications. The term "customer" refers to a person who normally buys products or services from such a commercial subscriber.

Accordingly, the present invention relates to methods and systems for controlling the provision of communication services over an identified group of communication lines assigned to one subscriber. The lines connect to a switched communication network having a plurality of switching offices. The subscriber inputs information defining criteria under which the subscriber wishes to offer communication services over the group of lines to one or more of the subscriber's customers. The input information is stored in a centralized database in the switched communication network separate from the plurality of switching offices. The system will detect when a person, e.g. one of the subscriber's customers, wants to use one of the subscriber's lines. For example, the connected switching office will recognize an attempt to seize the one line. The connected switching office will transmit information characterizing the attempt to obtain a communication service to the centralized database. The subscriber's information stored in the database is accessed, and the system provides switched communication service on the one communication line of the subscriber's group if the information characterizing the attempt to obtain a communication service meets the stored criteria.

The criteria set by the subscriber can relate to a wide variety of different factors. For example, the subscriber can activate the service for a set period by inputting on-time and off-time data. A subscriber can also define authorization code criteria, and the party using the line must then input a valid code before the system would provide the actual communication service. The information stored in the centralized database can limit the types of calls which the subscriber's customers can make over the line and can control routing of calls through the communication network.

In one mode of operation, the subscriber would input an authorization code including a product code identifying a product or service for which the identified lines of the subscriber's group are to be activated, and a password to be used with the particular product code. The subscriber would also input an on-time and an off-time defining an interval during which the service should be active. The product code corresponds to some information identifying a particular product or service offered by the subscriber, such as a model number for a particular item sold by the subscriber, a late airline flight, etc. The password is an arbitrary code which the subscriber will then give only to persons the subscriber wishes to have access to the communication service.

In a preferred embodiment, an off-hook at one of the subscriber's identified lines triggers AIN processing. At this point, the local office sends a query to the ISCP which sends back an instruction for the local office to play a dial tone. Although provided as an announcement from a separate announcement trunk or platform, to the subscriber the dial tone sounds like normal central office dial tone. The caller then dials a destination number in the normal manner. Alternatively, the AIN processing could be triggered in response to other events, for example after normal central office dial tone and collection of destination digits dialed in via one of the lines of the subscriber's group.

In the mode of operation using an authorization code, the central office provides an announcement to the caller in the form of a subsequent dial tone or synthesized speech message requesting entry of the authorization code. The local office then receives and forwards to the ISCP dialed digits corresponding to an authorization code. The ISCP checks the product code and the password from the dialed input for validity. More specifically, the central office sends the authorization code as a single string of digits containing both the product code and the password. When the ISCP validates a received product code and password, it actually breaks the received digits down into two pieces and processes the product code and password separately.

If both the product code and password are valid, the ISCP checks the time of the present call against data stored in the subscriber's data table indicating the on and off times for activating the communication service related to the particular product. If the call occurs during the on time interval, the ISCP sends a return result message instructing the central office to resume call processing and route the call to the dialed destination. The return message from the ISCP may include instructions to route the call over private trunk facilities owned or leased by the commercial subscriber, particularly where the ISCP determines that the desired call is an inter-LATA call. The network executes normal call processing routines for servicing the call using the information received from the ISCP.

As part of the call processing, the ISCP could also analyze the dialed destination data to determine if the subscriber has authorized the particular call. The ISCP would instruct the central office to terminate or compete the call based on whether the dialed digits of the call meet the subscriber's criteria. For example, the database would store data as to what if any long distance calls might be permitted.

In the above described implementation, the subscriber turns on the service by inputting data into the ISCP database setting up a product code, a password and a time interval for activation. Either as an alternative or in addition to the product code and password approach, the system could allow the subscriber to toggle on the communication service to the lines for a set time. With this approach, the representative of the subscriber calls in and simply inputs the on-time and off-time information. When a caller takes a telephone connected to one of the subscriber's lines off-hook, the local office sends a query to the ISCP. If the service is active at that time, the ISCP sends back an instruction for the local office to play a dial tone, and the call is processed in the normal manner or using the product code and password discussed above, depending on how the particular subscriber has chosen to set up its own service. If the ISCP determines that the service is not active at the time of the off-hook, the ISCP sends back an instruction for the local office to play an announcement, for example stating that service is restricted and the line is not available for service at this time.

The present invention can use an interactive DTMF procedure to enter the information to activate the service for the particular subscriber's lines. In such an implementation, a representative of the subscriber would dial a specified number to initiate programming. The system would provide the caller with a prompt and the caller would respond by entering an identification number indicating that the caller is a person authorized to activate the subscriber's hold room service. The ISCP would analyze the dialed DTMF identification number to identify the subscriber's data files and the authorized caller.

If the caller passes the security checks, the system would proceed with an interactive session, providing prompts to the caller and receiving DTMF inputs, whereby the caller enters data to change the subscriber's data table as currently stored in the database. The interactive routine would mirror the call processing routine for the particular subscriber.

In another implementation, the system would accept voice inputs of the caller's identification number and the programming data as an alternative to the DTMF inputs discussed above. As a further alternative, subscribers may obtain the requisite access to the database in the ISCP via a Personal Computer, a data terminal or some other form of work station.

Additional objects, advantages and novel features of the invention will be set forth in part in the description which follows, and in part will become apparent to those skilled in the art upon examination of the following or may be learned by practice of the invention. The objects and advantages of the invention may be realized and attained by means of the instrumentalities and combinations particularly pointed out in the appended claims.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a schematic block diagram of the components of an Advanced Intelligent Network system of the first embodiment of the system for implementing the invention.

FIG. 1A is a schematic block diagram showing an Advanced Intelligent Network system, similar to FIG. 1, which also includes several additional components facilitating different types of subscriber data entry.

FIGS. 2A to 2D form a flow chart depicting one example of call processing in accord with the present invention.

FIGS. 3A and 3B form a flow chart illustrating an interactive procedure for DTMF input of a subscriber's control data.

BEST MODE FOR CARRYING OUT THE INVENTION

FIGS. 1 and 1A illustrate preferred telephone network architectures for providing the various service and restriction controls of the present invention. A number of other network architectures can also be used, as discussed in more detail later.

In the system shown in FIG. 1, each of the central office switching systems are labeled as an "SSP." The Service Switching Points, referred to as SSP's, are appropriately equipped programmable switches present in 'the telephone network, which recognize AIN type calls, launch queries to the ISCP and receive commands and data from the ISCP to further process the AIN calls.

As shown in FIG. 1, all of the central office switches 11, 13, 15 and 17 are equipped and programmed to serve as SSP's. Such central office switching systems typically consist of a programmable digital switch with CCIS communications capabilities. One example of such a switch is a 5ESS type switch manufactured by AT&T; but other vendors, such as Northern Telecom and Seimens, manufacture comparable digital switches which could serve as the SSP's. The illustrated embodiment is perhaps an ideal implementation which would make a variety of Advance Intelligent Network AIN services widely available at the local office level throughout the network. As will be discussed later, other AIN implementations provide the SSP functionality only at selected points in the network, and end offices without such functionality forward calls to one of the SSP's.

The SSP's 11 and 13 connect to a first local area STP 23, and the SSP's 15 and 17 connect to a second local area STP 25. The connections to the STP's are for signalling purposes. As indicated by the black dots below STP's 23 and 25, each local area STP can connect to a large number of the SSP's. The central offices or SSP's are interconnected to each other by trunk circuits (illustrated in FIG. 1 as bold lines) for carrying telephone services.

The local area STP's 23 and 25, and any number of other such local area STP's shown as black dots between STP's 23 and 25 communicate with a state or regional STP 31. The state or regional STP 31 in turn provides communications with the ISCP 40. The STP hierarchy can be expanded or contracted to as many levels as needed to serve any size area covered by the Advanced Intelligent Network (AIN) and to service any number of stations and central office switches. The links between the central office switching systems and the local area STP's 23 and 25 are typically SS#7 type CCIS interoffice data communication channels. The local area STP's are in turn connected to each other and to the regional STP 31 via a packet switched network. The regional STP 31 also communicates with the ISCP 40 via a packet switched network.

The above described data signalling network between the SSP type central offices and the ISCP is preferred, but other signalling networks could be used. For example, instead of the CCIS links, STP's and packet networks, a number of central office switches and an ISCP could be linked for data communication by a token ring network. Also, the SSP capability may not always be available at the local office level, and several other implementations might be used to provide the requisite SSP capability as will be discussed in more detail later.

The messages transmitted between the SSP's and the ISCP are all formatted in accord with the Transaction Capabilities Applications Protocol (TCAP). The TCAP protocol provides standardized formats for various query and response messages. Each query and response includes data fields for a variety of different pieces of information relating to the current call. For example, an initial TCAP query from the SSP includes, among other data, a "Service Key" which is the calling party's address. TCAP also specifies a standard message response format including routing information, such as primary carrier ID, alternate carrier ID and second alternate carrier ID and a routing number and a destination number. The TCAP specifies a number of additional message formats, for example a format for a subsequent query from the SSP, and formats for "INVOKE" messages for instructing the SSP to play an announcement or to play an announcement and collect digits.

There could be one or more ISCP's per state, to avoid overloading existing CCIS data links. Alternatively, the ISCP could be implemented on a LATA by LATA basis or on a regional operating company basis, i.e. one data base for the entire geographic area serviced by one of the Regional Bell Operating Companies. In fact, if federal regulations permitted, the data base service could become nationwide.

As shown in FIG. 1, the ISCP 40 is an integrated system. Among other system components, the ISCP 40 includes a Service Management System (SMS) 41, a Data and Reporting System (D&RS) 45 and the actual database referred to as a Service Control Point (SCP) 43. The ISCP also typically includes a terminal subsystem referred to as a Service Creation Environment or SCE (not shown) for programming the data base in the SCP 43 for the services subscribed to by each individual business customer.

Although shown as telephones in FIG. 1, the terminals can comprise any communication device compatible with the line. Where the line is a standard voice grade telephone line, for example, the terminals could include facsimile devices, modems etc.

Each central office switching system or SSP normally responds to a service request on a local communication line connected thereto, for example an off-hook followed by dialed digit information, to selectively connect the requesting line to another selected local communication line. The connection can be made locally through only the connected central office switching system. For example, for a call from station A to station B the SSP 11 provides the call connection without any connection to another central office. When the called line connects to a distant station, for example when station A calls station C, the connection is made through the connected central office switching system SSP 11 and at least one other central office switching system SSP 13 through the telephone trunks interconnecting the two central office switches.

In the normal call processing, the central office switching system responds to an off-hook and receives dialed digits from the calling station. The central office switching system analyzes the received digits to determine if the call is local or not. If the called station is local and the call can be completed through the one central office, the central office switching system connects the calling station to the called station. If, however, the called station is not local, the call must be completed through one or more distant central offices, and further processing is necessary. If at this point the call were connected serially through the trunks and appropriate central offices between the caller and the called party using in channel signalling, the trunks would be engaged before a determination is made that the called line is available or busy. Particularly if the called line is busy, this would unnecessarily tie up limited trunk capacity. The CCIS system through the STP's was developed to alleviate this problem.

In the CCIS type call processing method the local central office suspends the call and sends a query message through one or more of the STP's. The query message goes to the central office to which the called station is connected, referred to as the "terminating" central office; for example, for a call from station A to station C the query would go from originating SSP 11 to terminating SSP 13. The terminating central office determines whether or not the called station is busy. If the called station is busy, the terminating central office so informs the originating central office which in turn provides a busy signal to the calling station. If the called station is not busy, the terminating central office so informs the originating central office. A telephone connection is then constructed via the trunks and central offices of the network between the calling and called stations. The receiving central office then provides a ringing signal to the called station and sends ringback tone back through the connection to the calling station.

The call processing routines discussed above are similar to those used in existing networks to complete calls between stations. In an AIN type network system implementing the present service activation and call restriction type features, these normal call processing routines would still be executed for completion of calls between customer stations not subject to the relevant service restrictions and for completing calls originating from the commercial subscriber's restricted group of lines, when services to those lines is on and if necessary when the caller has entered correct access authorization data.

In an Advanced Intelligent Network (AIN) type system, such as shown in FIG. 1, certain calls receive

specialized AIN type processing under control of data files stored in the SCP database 43 within the ISCP 40. In such a network, the SSP type local offices of the public telephone network detect a call processing event identified as an AIN "trigger". For ordinary telephone service calls, there would be no event to trigger AIN processing; and the local and toll office switches would function normally and process such calls as discussed above, without referring to the SCP database for instructions. An SSP office which detects a trigger, however, will suspend call processing, compile a TCAP formatted call data message and forward that message via a common channel interoffice signalling (CCIS) link and STP(s) to the ISCP 40 which includes the SCP database 3. If needed, the ISCP can instruct the central office to obtain and forward additional information. Once sufficient information about the call has reached the ISCP, the ISCP accesses its stored data tables to translate the received message data into a call control message and returns the call control message to the office of the network via CCIS link and STP(s). The SSP then uses the call control message to complete the particular call through the network. The present invention allows a commercial subscriber to interact with the SCP database maintained in the ISCP, to establish and modify various criteria to activate and/or restrict communication services provided on a group of the subscriber's telephone lines and to control routing of calls from those lines.

The SSP type switches can recognize a variety of events as triggers for activating a query and response type AIN interaction with the ISCP. A number of different AIN triggers can be used in accord with the present invention. For example, the system could use an "off-hook delay trigger". With this type of trigger, the SSP provides standard switch dial tone on the off-hook line to the caller and collects dialed destination digits. The SSP, recognizing that the call originates on one of the lines of the subscriber's group would then launch the TCAP initial query to the ISCP. The system could also operate on an Individual Dialing Plan trigger (off-hook followed by dialing of three or four numbers- similar to dialing an extension number) or an Office Dialing Plan access code trigger (off-hook followed by dialing of an identified access code such as *66 or 8).

The preferred embodiment uses an off-hook immediate trigger to initiate AIN type call processing. Specifically, when a person picks up the handset of a telephone connected to one of the lines of the group, the SSP connected to that line accesses its translation tables and recognizes that line is subject to AIN processing. The SSP does not provide dial tone at this time. Instead, the SSP launches a TCAP query through the STP to the ISCP. This TCAP query contains a substantial amount of information, including data identifying the off-hook line and the current time. The ISCP uses the line identification to access the subscriber's data file within the SCP database. From this data, the ISCP determines what action to take next.

Exemplary Call Processing Routine

The present invention can process the calls from each subscriber's identified group of lines in a variety of different ways, and each subscriber can choose and control the processing of calls from their own lines as they see fit. One example of a call processing routine will be discussed below.

By way of example, it will be assumed that a particular subscriber is an airline company that operates a courtesy lounge for its passengers. Station sets 1 and 2 are located in the lounge. Furthermore, we will assume that the airline wants the telephone service active on those lines for a period of time and usually wants to limit use during that period to passengers scheduled on a delayed flight. The airline has elected to use an authorization code procedure. The authorization code could be input at some point prior to dialing in the destination digits. For purposes of this example, however, it will also be assumed that the subscriber wishes to permit dialing of the destination number before requiring input of the authorization code. The airline will tell passengers on the delayed flight that after dialing the destination number they will need to input their flight number (product code) and a password given to the passengers by the airline. The password can be any arbitrary code selected by the airline subscriber to insure that only its passengers can use the group of lines in the courtesy lounge. For example, the airline might choose to use the date of the flight or a number from 1 to 7 for the day of the week of the flight, as the password.

FIG. 2 provides a sample of a call processing routine in accord with the present invention essentially corresponding to the airline courtesy lounge example set forth above. Other call processing routines can be used. In particular, the call processing routines can be customized to a substantial extent for different subscriber by storing different data for each subscriber in the SCP database 43. For example, a different subscriber may choose to require input and validation of the authorization code prior to dialing the destination number. Also, the example of FIG. 2 uses an off-hook immediate type trigger, but the processing can easily be modified to use other types of AIN triggers as discussed above.

The specific example of call processing will now be discussed with reference to the flow chart shown in FIGS. 2A to 2D. Call processing begins at step S1 when a party takes a telephone set or other line connected equipment off-hook. The SSP connected to the particular telephone line will detect this condition. At step $2, that SSP will examine its translation tables for the off-hook line and determine if that line is a member of a subscriber's group. Essentially, the SSP determines if the off-hook on this particular line is an "off-hook" trigger for activating AIN query and response procedures. If the decision at step $2 indicates that the line is not a member of an identified group of lines, the SSP executes its normal call processing routines (step S3) and the call is completed (step S4) in the normal manner. If the decision at step S2 indicates that the line is a member of an identified group of line, i.e. that the off-hook line is one of the lines connected to the station 1 and 2, in the subscriber's courtesy lounge, the SSP 15 advances to step S5 to initiate AIN type processing.

At step S5, the SSP 15 sends a TCAP `Query` message to the ISCP 40 via the STP(s) and the various data links, as shown in FIG. 1. The Service Key portion of the TCAP query will include Automatic Number Identification (ANI) data identifying the off-hook line, and the ISCP uses this identification data to access the particular subscriber's data files in the SCP database 43. The ISCP examines the subscriber's data file. At step S6, if the subscriber has elected not to toggle the service for the off-hook line, processing skips the next decision and proceeds to step S11, which will be discussed below.

If the subscriber has programmed in a toggle function, processing moves from step S6 to step S7 wherein the ISCP next determines if the subscriber has turned the service to the line on. This could require simply checking one bit in the subscriber's data file to determine if the service is on or off. In preferred embodiments, the subscriber could program in on and off times for the service. The initial TCAP query message includes a time stamp indicating the time when the call was initiated. If the subscriber has set on and off times, the ISCP compares the time stamp to the on and off-times to determine if the call was initiated during the period when the subscriber wants the service on.

If the decision in step S7 indicates that the service is not on, the ISCP sends a TCAP return result message via the STP(s) instructing the SSP to play a `Terminate` announcement (step S8). The SSP plays the announcement identified in this latest TCAP message (Step S9). The announcement can be a tone signal or a voice message saying that service is not available at this time. In response, the calling party will hang up and processing ends at step S10.

As noted above, if the subscriber did not have a toggle function for controlling service to the particular line, process flow extended from step S6 to step S11. Processing also alternately flows to step S11 if the decision at step S7 indicated that service to the off-hook line was currently on. At step S11, the ISCP sends a TCAP `Invoke` message to the SSP via the STP(s). An Invoke message instructs the SSP to play an identified announcement and collect a specified number of digits up to fifteen. In this case, the message identifies a dial tone as the announcement and instructs the SSP to collect up to fifteen digits.

At step S12, the SSP connects the off-hook line to an announcement trunk or platform within the SSP switching office, to place a dial tone on the off-hook line. Although provided as an announcement, to the person attempting to use the line this sounds like normal central office dial tone. In response, the person will dial in destination digits in the normal manner. The SSP collects digits until it receives the maximum number of fifteen digits or until a time limit expires after the last digit received from the caller indicating that the caller has stopped dialing digits. The SSP will send another TCAP message including the dialed destination digits to the ISCP via the STP(s) (step S13). At step S14, the ISCP examines the number of digits dialed.

If the person using the line dialed only 1 or 3 digits, for example, "0", "411" or "911", the call is to be routed to the subscriber's own operator. Thus, if the decision at step S14 indicates that the caller dialed only 1 or 3 digits, processing flows to step S15 (FIG. 2B). At step S15, the ISCP send a TCAP message to the SSP via the STP(s). This message includes a destination number for a private operator station line assigned to the subscriber. The SSP uses the received destination number to execute otherwise normal call routing procedures to route the call through the network to the subscriber's operator station (step S16). At step S17 the call is completed to the operator station, and the person using the line can carry on a conversation with the subscriber's operator.

If the decision at step S14 indicated that the person using the off-hook line dialed 7 digits or more, the person apparently is attempting to make a local call, a long distance call or an international call. Processing therefore extends to step S18 shown in FIG. 2C. At step S18, if the particular subscriber has selected to have no authorization code procedure or has input data to temporarily override the authorization code procedure, then processing branches to step S25 (FIG. 2D).

If an authorization code procedure is necessary, step S8 causes call processing to branch step S19. At this next step, the ISCP sends a TCAP 'Invoke'message to the SSP via the STP(s). In this case, the Invoke message identifies an announcement signifying a request for input of authorization digits and instructs the SSP to collect the appropriate number of digits for the particular subscriber's authorization code procedure. The message can be a synthesized speech announcement, if a customized message is available from a peripheral announcement platform, or the announcement can be a subsequent dial tone if the SSP must provide the announcement itself.

At step S20, the SSP connects the off-hook line to an announcement trunk or platform to place the announcement identified in the TCAP Invoke message on the off-hook line and then collects the specified number of digits. The SSP then sends another TCAP message including the dialed authorization code digits to the ISCP via the STP's (step S21). The ISCP will next execute a series of steps to check the code for validity and to determine if service is currently available.

In the preferred embodiments using an authorization code procedure, the authorization code includes a "product code" and a "password". As used herein, the product code corresponds to some information identifying a particular product or service offered by the subscriber. The product code could be a model number for a particular item sold by the subscriber, for example the model number of a car, a washing machine or a refrigerator. The product code could also identify a service, and in the present example the product code would be one of the airline subscriber's flights. The "password" is an arbitrary code which the subscriber will then give only to persons the subscriber wishes to have access to the service. Typically, airline flights of a given number repeat periodically, e.g. daily or weekly. Therefore, if the subscriber is an airline, the added password might be a date for the one flight which is actually subject to a delay.

The customer using the line dials in a string of digits, e.g. eight digits long, and the SSP central office sends the dialed authorization code data as a single string of digits containing both the product code and the password. When the ISCP validates a received product code and password, it actually breaks the received digits down into two pieces and processes the product code and password separately. The ISCP first checks to see if the subscriber's table in the data base currently includes the received product code, e.g. that the airline actually has entered data for a delayed flight identified by the received product code. If the product code is invalid, the ISCP sends a message instructing the central office to connect the call to an announcement telling the caller that the call can not be completed as dialed.

With specific reference to the call processing example in FIG. 2C, the ISCP first checks the validity of the product code first (step S22). In the airline example, the product code would correspond to the flight number (four digits) of a delayed or cancelled flight, and the ISCP would check to determine if the subscriber has listed the particular four digits entered by the caller in the flight number portion of the subscriber's data table in the SCP database 43. If the product code is valid, the ISCP then proceeds to step S23 and checks to see if the password is in the data table. In the airline example, the ISCP checks to see if the date currently is recorded in the airline's table and corresponds to the received flight number.

If the password is valid, the ISCP proceeds to step S24 to determine if the call was initiated during the on time period, defined by the subscriber, for the particular product or service (e.g. the particular delayed flight). A typical TCAP query from an SSP central office to the ISCP, such as sent in step S5, will include a time "stamp" indicating the time of the call. In step S24, the ISCP checks the time stamp for the present call against data stored in the airline's table indicating the on and off times for activating the communication service related to the particular flight. If the call occurs during the on time interval, the ISCP proceeds to step S25 shown in FIG. 2D.

If any of the decisions in steps S22, S23, and S24 produced a negative result, i.e. if the product code is not valid, if the password is not valid, or if the call occurs outside of the relevant on-time interval, processing flows back to step S8. As discussed earlier, the ISCP will send a message instructing the SSP type central office to connect the call to the `Terminate` announcement telling the caller that the call can not be completed (step S8). The SSP will play the `Terminate` announcement (step S9). In response, the calling party will hang up and processing ends at step S10.

Processing reaches step S25 in FIG. 2D either because the subscriber elected to skip the authorization portion of the call processing routine (from step S18) or after both portion of the authorization code and the time of the call have been validated (from step S24). The present invention can also allow the subscriber to define restrictions on what types of calls can be made from the identified group of the subscriber's lines. Different subscribers can choose to restrict calls in different ways. For example, the calls can be restricted essentially the same way at all times. Many subscribers, however, may prefer to program in restriction criteria in essentially the same way as they will program in the product code and password. For example, the SCP database 43 would store data as to what if any long distance calls might be permitted for calls at a certain time and/or using a certain product code. In the airline context, if the delayed flight were going to London, this stored restriction data might permit local calls and only long distance calls to England.

In step S25, therefore, the ISCP examines the dialed destination digits (received in step S13) and the subscriber's file in the database to determine whether or not the call is directed to a restricted destination. Specifically, the ISCP checks to see if the subscriber has established any restriction criteria, and if so, the ISCP checks to see if the call meets those criteria. If the decision in step S25 indicates that the destination digits identify a restricted call, processing flows back to step S8. Again, at this point the ISCP will send a TCAP message instructing the central office to connect the call to the `Terminate` announcement telling the caller that the call can not be completed (step S8). The SSP will play the `Terminate` announcement (step S9). In response, the calling party will hang up and processing ends at step S10.

If the decision in step S25 indicates that the destination digits do not identify a restricted call, the ISCP sends a TCAP routing message to the SSP via the STP(s). This routing message is essentially similar to the message transmitted in step S15. Both messages include a destination number and routing control information (as discussed below). In the message used in step S26, however, the destination number essentially corresponds to the number dialed in by the person attempting to use the subscriber's line. In response to the routing message, the central office resumes call processing and routes the call through the network to the dialed destination (step S27), in essentially a normal manner. At step S28, the call is completed to the dialed destination station.

In either step S15 or step S26, the TCAP message from the ISCP includes data fields for instructions to route the call over specified trunk circuits or trunk groups. The subscriber therefore can populate corresponding data files in the subscriber's table in the SCP database 43, and the ISCP will insert the relevant instructions into the TCAP message sent back to the SSP to route the call. These instructions can be used to route calls over privately owned or leased trunk facilities, particularly where the ISCP determines that the desired call is an inter-LATA or international call.

In one example, the routing control information stored in the SCP database 43 would specify three trunk groups, in priority order. For example, the first trunk group might be a group of private tie lines, the second trunk group might be AT&T WATS lines and the third might be through MCI trunk lines. Upon receiving the TCAP response message including the destination number and the identification of the three trunk groups in priority order, the central office would use the highest priority trunk group then available to complete the call, and if all specified trunk groups are busy, complete the call through the standard direct dial telephone network.

The present system can provide subscribers other types of routing control routines, as desired by each subscriber. Instead of specifying priority order, the stored data might identify different trunk groups for use at different times of day. Based on the current time, the ISCP would send a TCAP response message identifying a single trunk group, and the switch would then use that trunk group to complete the call. Also, instead of specifying private trunk groups, such as tie lines, the stored routing data could specify one or more trunk groups, or even individual trunk circuits, through the public switched telephone network itself. The programmability of the customer's stored data allows each customer a virtually unlimited selection of routing control routines, so that each business subscriber can customize its routing control to optimize use of its available trunk resources.

In the above described implementation, the airline subscriber can turn on the service by inputting data into the SCP database setting up a product code, a password and a time interval for activation. The specific product codes and passwords each subscriber uses are entirely defined by the subscribers, as discussed in more detail below. As shown in the flow chart, either as an alternative or in addition to the product code and password approach, the system subscriber can enter data to toggle on the communication service to the lines for a set time. The subscriber can also define restrictions on what types of calls should or should not be completed and can establish call routing procedures to minimize cost to the subscriber and/or to take maximum advantage of the subscriber's trunk circuit resources.

The present system can provide the subscriber with Station Message Detail Reports (SMDR) for all calls made from the identified group of the subscriber's lines. If the subscriber uses a product code and password, the message detail reports can indicate which calls used each product code and/or password. The detail recording can be performed, for example, by the ISCP 40. The precise detail recording can be controlled by data in the SCP database, therefore each subscriber can receive customized reports.

Each TCAP query includes a Service Key portion which identifies the telephone number of the off-hook line. Each central record is driven by a telephone number. Thus, every time an SSP makes a query to the ISCP and the ISCP responds, the Data and Reporting System (D&RS) 45 in the ISCP 40 captures the data and stores an appropriate record of the transaction in a record corresponding to the telephone number of the subscriber's line from which the call originated. The time of initiating the service request is known from the time of receipt of the query, i.e., by subtracting the known maximum period for transmission of the query from an SSP to the ISCP from the time of receipt or, the query. The D&RS 45 can record call disposition based on what final response the ISCP sent back to the originating SSP type central office. The record therefore will indicate when a customer requested communication service, what line the customer used, the product and password used, where the customer called and precisely how the ISCP instructed the SSP to dispose of the call.

If the call duration is to be included in the SMDR reports, the D&RS must also capture information indicating the time of termination of the call. The SSP type switch could be programmed to provide a further message to the ISCP upon completion of each call from a line in the subscriber's group. The further message would be routed to the ISCP in the standard manner but would indicate the time that the call or service terminated.

The SMDR reports could be provided in the form of printouts mailed to the customer on a specified periodic basis. Alternatively, each commercial subscriber could have one or more data terminals set up to receive the reports over a data link to the D&RS 45 within the ISCP, for example via modems and dial up telephone lines. If data terminals are used, data in the SCP might also specify the time and telephone number to deliver the reports to each subscriber's own terminal.

It is also possible to use a number of other systems for providing detailed reporting of all calls made from the identified group of the subscriber's lines.

Subscriber Data Input

A subscriber's service is initially set up by a telephone company technician using the Service Creation Environment or SCE (not shown) in the ISCP 40. As part of this procedure, the technician establishes one or more data tables for the subscriber in the SCP 43. The format of the data tables would be defined by the types of data needed to control the service in the manner selected by the particular subscriber. Any control data which the subscriber wants to apply as fixed data to all calls would also be input by the technician using the SCE. Subsequently, the subscriber's representative would actually control the service by inputting data to populate the subscriber's data table(s) using one of the techniques discussed below.

One implementation for receiving inputs from the subscriber uses an interactive voice and DTMF input type access procedure. The subscriber would dial a specified number to initiate programming, for example a seven digit number such as 550-0211. The call could be routed through the network to a dial up telephone line connected to an appropriate automated voice response system (not shown in FIG. 1) coupled to the SMS 41 in the ISCP 40. The voice response system would provide synthesized speech prompts and accept DTMF inputs to allow the subscriber's representative to enter the time, or authorization code data or the like to activate the service on the subscriber's lines and control call restrictions and/or call routing.

In the preferred implementation of FIG. 1, the SSP connected to the line could interpret this dialed number as an AIN trigger and respond to instructions from the ISCP to provide announcements to the caller and forward dialed digits and Automatic Number Identification (ANI) data to the ISCP as TCAP messages. FIGS. 3A and 3B together form a flow chart showing a simplified example of a routine for inputting the subscriber data, using an interactive DTMF input procedure and the preferred network architecture of FIG. 1.

At step S31, the subscriber's representative would take a standard telephone station, for example station set A, off-hook and dial the assigned programming telephone number (e.g. 550-0211). In this implementation, the programming number is not an actual telephone number. The programming number is a virtual number for which the network has no actual equipment connected to any particular line.

The connected SSP collects digits and recognizes the dialed programming number as an AIN trigger (destination number type trigger). The SSP therefore would respond to the off-hook and dialing of the programming number by launching an initial TCAP query at step S32 to the ISCP via the STP(s). This initial query would include the dialed digits and an identification of the line from which the representative initiated the call.

The ISCP would recognize the dialed digits as a request for subscriber input of service programming data. A number of different approaches can be used to identify the particular subscriber. Each subscriber to this service might have a different number to dial and/or the representative might be required to dial in from a telephone line assigned to the particular subscriber. The ISCP therefore identifies the particular subscriber from the dialed digit data and/or the off-hook line identification data included in the TCAP query message. The ISCP then accesses the particular subscriber's data files in the SCP database 43.

At step S33, the ISCP sends a TCAP `Invoke` message to the SSP via the STP(s). The Invoke message instructs the SSP to play an identified announcement and collect a specified number of digits up to fifteen. In this case the announcement would serve as a prompt instructing the subscriber's representative to input access code data, typically a representative's personal identification number. If the SSP has access to a peripheral announcement platform having extensive voice massaging capabilities, the announcement could be a synthesized speech message. Alternatively, the announcement could take the form of a subsequent dial tone signal.

In response to the Invoke message, the SSP connects the off-hook line to an announcement trunk or platform to place the announcement identified in the TCAP Invoke message on the off-hook line and then collects digits from the caller (step S34). If the caller is the subscriber's representative, she dials in a personal identification number or other access code indicating she is authorized access to the particular subscriber's data. The SSP then sends another TCAP message including the dialed access code digits to the ISCP via the STP's (step S35).

At step S36, the ISCP checks the received access code digits against one or more access codes in the subscriber's table in the SCP database 43. If the received code is valid, processing flows to step S40 (FIG. 3B), as will be discussed below. If the received code is not valid, however, processing flows to step S37. The ISCP sends a TCAP message via the STP(s) instructing the SSP to play a `Terminate` announcement (step S37). The SSP plays the announcement identified in this latest TCAP message (step S38). The announcement can be a tone signal or a voice message saying that the call can not be completed as dialed. In response, the calling party will hang up and processing ends at step S39.

From the subscriber's data files, the ISCP determines what data is necessary for programming of a particular subscriber's services. Thus, if the decision in step S36 indicated that the received code is valid, the ISCP will proceed with execution of a procedure to enter the data necessary for control of the particular subscriber's call processing routine. As such, the succeeding steps essentially mirror steps of the subscriber's call processing routine. In step S40, therefore, the processing branches to execute the data input routine appropriate for the identified subscriber. This branching may involve a branch to a totally different routine for each subscriber. In the present example, processing branches to a routine for input of the airline subscriber's information.

A simplified version of the airline courtesy lounge example discussed above will be used for purposes of further discussion. It will be assumed here that the airline subscriber wants to program in product code data (a flight number) and a password (e.g. a date of a delayed flight). To activate the service to the group of lines, the subscriber inputs the product code and password. The group of lines all are identified in advance, and the airline has elected not to further select individual lines during the data input procedure. Also, the routing control information has been entered in advance by the telephone company technician in response to a service request by the airline.

At step S41, the ISCP sends another TCAP `Invoke` message to the SSP via the STP(s) instructing the SSP to play an announcement and collect digits. Again, this announcement may be a synthesized speech message, and here the message would request input of authorization code data. Alternatively, the announcement would can be a tone signal which the subscriber's representative knows is a request to input authorization code data. In response to the Invoke message, the SSP connects the line to an announcement trunk or platform to place the announcement identified in the TCAP Invoke message on the off-hook line and then collects digits from the caller (step S42). For the airline, the authorization code would include a four digit product code corresponding to one of the airline's flight numbers. The authorization code would also include a four digit expression of the day of the year (e.g. 1208 for December 8th). The SSP next sends another TCAP message including the dialed authorization code digits to the ISCP via the STP's (step S43).

At step S44, the ISCP sends another TCAP `Invoke` message to the SSP via the STP(s) instructing the SSP to play an announcement and collect digits. Again, this announcement may be a synthesized speech message or a tone signal. In this case the announcement prompts the subscriber's representative to enter the requisite timing data.

In response to this Invoke message, the SSP connects the line to an announcement trunk or platform to place the announcement identified in the TCAP Invoke message on the line and then collects digits from the caller (step S45). For the airline, the timing data would include four digits representing an on-time in military notation (e.g. "1415" for 2:15 PM) followed by four digits representing an off-time in military notation (e.g. "1515" for 3:15 PM). The SSP next sends another TCAP message including the dialed timing data digits to the ISCP via the STP's (step S46).

The ISCP stores the received data in the subscriber's files and sends a TCAP return result message via the STP(s) instructing the SSP to play an announcement indicating that data input is complete (step S47). The SSP plays the announcement identified in this latest TCAP message (Step S48). In response, the calling party will hang up and processing ends at step S49.

If the desired control of particular subscriber's service requires additional data inputs, the system would repeatedly prompt the subscriber's representative and collect appropriate numbers of digits (e.g., by repeating steps similar to steps 541-543 and/or steps S44-S46). Such additional input data collection might allow a subscriber to specify call restriction data, for example by inputting area codes or international country codes for long distance calls which the subscriber wants to permit. This extended input routine might also collect information identifying what trunk groups to route calls over. The amount of data input and the meaning thereof will vary from subscriber to subscriber, depending on how each subscriber chooses to set up and control the service on the subscriber's group of lines.

Although not shown in the flow chart, the ISCP will verify received data inputs from the subscriber's representative to insure that they meet the requirements for controlling the particular subscriber's call processing routine. If errors are found, for example if the caller entered only seven digits at a point where eight were expected, the system could provide an error message and prompt again for input of the relevant data. If the system has synthesized speech massaging facilities, the system can also provide confirmation messages repeating back the received data and requesting dialing of a confirmation code, such as depression of the `#` key.

In each DTMF routine discussed above, as part of the interactive procedure the subscriber would enter an identification number indicating that the particular calling party is authorized access to the subscriber's data. The ISCP would receive and use the dialed DTMF identification number to identify the subscriber's data files.

FIG. 1A illustrates several alternatives for receiving subscriber inputs and transferring input data for storage in the SCP database 43. Different subscribers may access the system using different means, and/or one subscriber may access the database one way one time and a different way at other times.

A first alternative shown in FIG. 1A shows a further voice responsive arrangement for receiving subscriber input data. As illustrated, a line 30 connects an Interactive Voice Response (IVR) unit 29 to one of the SSP's 13. When the subscriber dials the specified number to initiate programming, the call is routed through the network to the line 30 and the IVR unit 29. Unlike the automated voice response implementation discussed briefly earlier, however, IVR unit 29 is not coupled directly to the SMS 41 in the ISCP 40.

The IVR unit 29 would store a script for conducting a customized interactive input procedure for each particular subscriber. The IVR unit would provide customized synthesized speech prompts and accept DTMF inputs to execute an authorization procedure and to allow the authorized subscriber's representative to enter the time data, authorization code data or the like to activate and control the telephone service on the subscriber's lines. The routine for entering data would be essentially a mirror image of the service the particular subscriber has subscribed to. For example, if the subscriber wants to the service turned on and off at certain times, the Interactive Voice Response unit 29 would sequentially prompt the caller with messages directing the caller to enter one of the relevant inputs and then an appropriate DTMF input. As a further modification, the IVR unit 29 could include voice recognition means to accept verbal data inputs.

Through the above discussed interactive procedure, the IVR unit 29 will collect all necessary information from the subscriber's representative, after which the representative hangs up. The IVR unit 29 will then dial a virtual number indicating its need to transfer data to the ISCP 40. The SSP 11 will recognize the dialed virtual number as an AIN trigger and will initiate a query and response routine with the ISCP similar to that discussed above with regard to FIGS. 3A and 3B. The initial TCAP query will indicate the identity of the line 30 going to the IVR and the dialed virtual number. Using this information, the ISCP will determine that the present call relates to input of subscriber information. The ISCP therefore instructs the SSP to collect digits. The IVR unit 29 dials in up to fifteen digits, relating to the latest subscriber input, and the SSP 13 transfers that data in a further TCAP message to the ISCP. The ISCP may identify the particular subscriber from a portion of the virtual number dialed by the IVR unit or from digits transferred in the subsequent TCAP message to the ISCP. Based on the format of data needed to activate services for the particular subscriber, the ISCP and the SSP 13 repeat this digit collection sequence until all of the subscriber input data has been transferred to the ISCP.

FIG. 1A also illustrates two data terminal type interfaces for entering the subscriber's data. First, a dedicated data communication line 26 provides a direct connection from the data terminal 22 to the SMS 41. The data terminal preferably is a relatively smart, programmable device, such as a personal computer or a computerized work station. The data terminal 24 is located on the subscriber's premises. The terminal would store considerable information relating to the subscriber's products and services and preset tables or forms for entry of the necessary data to control that subscriber's restricted access communication services. When the subscriber wants to activate communication services in relation to one or a series of products, the representative accesses the necessary data relating to products or services and completes the data tables to activate the communication services, for example identifying the particular line(s) for which service will be active and the on and off times. When the representative has entered and confirmed the data for activating the service, the terminal would download that data to the SMS 41 within the ISCP, via the dedicated data link 26. The dedicated data line allows rapid transfer of large quantities of data, for example to facilitate activating communications relating to a large number of the subscriber's products or services, such as a group of flights which are delayed or cancelled because a hub airport terminal is closed due to inclement weather.

Alternatively, the subscriber could have a terminal 24 connected to a standard telephone line 27. The terminal 24 includes a modem (not shown) for transmitting and receiving data over a voice grade telephone line. The terminal 24 operates in a manner similar to the terminal 22, except that the terminal 24 downloads the relevant data via the lines and trunks of the public switched telephone network. The SMS 41 connects to a dial-up telephone line 28 and includes a modem (not shown) connected to that line. To download data, the operator initiates a call to the SMS by manually or automatically dialing the number of the telephone line 28 going to the SMS 41. The call is switched through the SSP's and trunks to establish the necessary connection, exactly as for a normal telephone call. When the modem connected to the SMS 41 answers on line 28, the modem in the terminal 24 executes a handshake procedure, and the terminal 24 downloads the data to the SMS 41.

The above discussion of the data terminals assumed that the terminals 22, 24 were preprogrammed to accept data inputs and subsequently download completed data entries. It is also possible to perform data input via either a dedicated link or a dial up link, using "dumb" terminal or a PC operating in a "dumb" terminal mode. With this approach, the SMS would send data to the terminal for display prompting the operator to input the necessary data. Any forms, tables or other customized data entry formats would be stored and sent from the SMS 41. The terminal would transmit the data inputs from the subscriber's representative to the SMS as the representative types them in on the terminal keyboard.

Security is controlled through the terminal and/or the line from which the terminal calls in to the ISCP. The terminal may have a built in security code which the ISCP verifies before granting access to the database. If the subscriber uses the terminal 24 and standard telephone line 27, the ISCP may check the originating telephone number and the terminal identity number against a stored number from which that terminal is expected to call. Once access was granted, however, the terminal would only have access to an individual customer's files or the files of employees of a business customer. Other customer's files, and the programming which controls system operation, would not be available through such terminal access.

The ISCP includes a validation system, which is an expert system prevents incompatible entries. For example, the validation system prevents entry of service changes which would create infinite loops that would cause the switch to malfunction. For all of the different forms of data input discussed above, the validation system would examine all data inputs from subscribers and permit entry of new data into the SCP database 43 only if the received data is complete and is compatible with system operations.

Alternate Network Architectures

The Advanced Intelligent Network architectures shown in FIGS. 1 and 1A are preferred embodiments of telephone networks for practicing the present invention. However, a variety of other intelligent network architectures may be used. For example, none of the end office switches may have SSP functionality. Instead, each end office would connect to a trunk tandem which in turn feeds calls to a central SSP capable switch. The SSP then communicates with the ISCP, as in the implementation described above, but in this case via an SS#7 type CCIS link. In another intelligent network embodiment, some of the end offices are SSP capable, and some are not. Again, each of the end offices normally communicates through a trunk tandem. For the SSP capable switches, they communicate directly with an STP which relays communications to and from the ISCP, in the same manner as in the embodiment of FIGS. 1 and 1A. For those end offices which lack SSP capability, calls are forwarded to the SSP capable trunk tandem which in turn relays data to and from the ISCP. In these alternate embodiments, the SSP capable trunk tandem switches are digital switches, such as the 5ESS switch from AT&T; and the non-SSP type end offices might be 1A analog type switches.

As another alternative, the intelligent network architecture could use distributed intelligences rather than the single Integrated Services Control Point (ISCP) of FIG. 1. In such a network, the SSP's connect to an STP which routes data signalling type communications between the SSP's, between the SSP's and distant offices, and between the SSP's and an SCP. In this case, however, the SCP is essentially only a computerized database. Actual call processing is largely controlled by a Service Circuit Node (SCN). The SCP in turn connects to a Service Management System (SMS). The SCP and the SCN are both connected to a Service Management System (SMS). All new or modified service data is input through a Service Creation Environment (SCE), and a validation process within the SMS checks the input data for completeness and compatibility with the existing programs of the network. The service data is then loaded as necessary into the SCP database, and as needed into the Service Circuit Node (SCN). The SCN connects via a direct voice and data signalling link to the SSP type switch, and is typically an adjunct processor device directly associated with one of the switches. The SCN stores the actual control programs and many of the look up tables for controlling actual call processing. In this type of intelligent network, one of the SSP's will detect a triggering event and launch a TCAP query through the STP to the SCP, in a manner similar to that discussed above with regard to FIG. 1. The SCP checks its data to determine that the caller is a customer and determines what general type of service the caller has requested. The SCP transmits a "SEND to RESOURCES" message back to the originating SSP instructing that SSP to access a channel to the SCN. The SCP also sends a message through the SMS and an X.25 packet switched data network to the SCN telling the SCN what type of call processing routine to execute. As needed, the SCN looks up information in its data tables relating to the call, and the SCN decides how to complete the call without further reference to the SCP. For interactive processing, playing announcements to the caller and collecting digits, the SCN may include an announcement frame similar to that included in an SSP, or the SCN may connect to a peripheral announcement platform.

Citations de brevets
Brevet cité Date de dépôt Date de publication Déposant Titre
US4313035 *18 janv. 198026 janv. 1982Bell Telephone Laboratories, IncorporatedMethod of providing person locator service
US4332982 *5 sept. 19801 juin 1982Ident-A-Call, Inc.Telephone toll call security and logging device and method
US4596900 *23 juin 198324 juin 1986Jackson Philip SPhone-line-linked, tone-operated control device
US4756020 *2 nov. 19875 juil. 1988American Telephone And Telegraph Company, At&T Bell LaboratoriesMethod and apparatus for disallowing the extension of a call through a network
US4796293 *18 déc. 19873 janv. 1989Communications Network Enhancement Inc.Enhanced dedicated teleconferencing system
US4833707 *4 févr. 198723 mai 1989Serret Systems Inc.Telephone lock unit
US4896346 *21 nov. 198823 janv. 1990American Telephone And Telegraph Company, At&T Bell LaboratoriesPassword controlled switching system
US4937854 *3 mars 198926 juin 1990Sarakas Stephen TCall screening device
US4939773 *26 juin 19893 juil. 1990First Data Resources, Inc.Multiple party telephone control system
US4987590 *26 janv. 199022 janv. 1991First Data Resources Inc.Multiple party telephone control system
US4993062 *10 févr. 198912 févr. 1991Communications Equipment And Engineering CompanyTelephone control system including stored blocked and allowed telephone numbers
US5091933 *17 janv. 199125 févr. 1992First Data Resources, Inc.Multiple party telephone control system
US5109408 *30 nov. 198928 avr. 1992At&T Bell LaboratoriesArrangement for intentionally blocking telephone calls to predefined destination numbers but allowing such blocking to be selectively overridden
US5200995 *24 déc. 19906 avr. 1993Gaukel John JUniversal outgoing call restriction circuit
US5222125 *3 sept. 199122 juin 1993At&T Bell LaboratoriesSystem for providing personalized telephone calling features
US5241580 *18 déc. 199031 août 1993Bell Communications Research, Inc.Method for validating customized telephone services
US5241588 *18 déc. 199031 août 1993Bell Communications Research, Inc.Systems and processes providing programmable or customized customer telephone information services
US5247571 *28 févr. 199221 sept. 1993Bell Atlantic Network Services, Inc.Area wide centrex
US5345380 *27 janv. 19936 sept. 1994Bell Communications Research, Inc.System and processes specifying customized customer telecommunication services using a graphical interface
JPS60177764A * Titre non disponible
Citations hors brevets
Référence
1"Call Control," Hello Direct Catalog, Winter 1991 pp. 38-39.
2Brosemer et al. "Virtual Networks: Past, Present and Future", IEEE Communications Magazine Mar. 1992 pp. 80-85.
3 *Brosemer et al. Virtual Networks: Past, Present and Future , IEEE Communications Magazine Mar. 1992 pp. 80 85.
4 *Call Control, Hello Direct Catalog, Winter 1991 pp. 38 39.
5Pasternak et al. "Taking the Pain out of change", BellCore exchange May/Jun. 1986 pp. 28-33.
6 *Pasternak et al. Taking the Pain out of change , BellCore exchange May/Jun. 1986 pp. 28 33.
7Perdue et al. "Conversant 1 Voice System: Architecture and Applications," AT&T Technical Journal, Sep./Oct. 1986 pp. 34-47.
8 *Perdue et al. Conversant 1 Voice System: Architecture and Applications, AT&T Technical Journal, Sep./Oct. 1986 pp. 34 47.
9Pierce et al, "Meeting Private Needs with the Public Network", BellCore Exchange. Jan./Feb. 1988 pp. 8-13.
10 *Pierce et al, Meeting Private Needs with the Public Network , BellCore Exchange. Jan./Feb. 1988 pp. 8 13.
Référencé par
Brevet citant Date de dépôt Date de publication Déposant Titre
US5524145 *6 avr. 19954 juin 1996Bell Atlantic Network Services, Inc.Incoming call completion threshold restriction
US5526413 *17 avr. 199511 juin 1996Bell Atlantic Network Services, Inc.Advanced intelligent network access by customer premise equipment
US5553130 *22 mai 19953 sept. 1996Bell Sygma Inc.Number translation services matrix
US5570410 *13 oct. 199429 oct. 1996Bellsouth CorporationDynamic resource allocation process for a service control point in an advanced intelligent network system
US5574780 *16 nov. 199512 nov. 1996Lucent Technologies Inc.Controll of call features provided to a subscriber by a hierarchical telecommunication switch
US5592541 *31 mai 19957 janv. 1997Southwestern Bell Technology Resources, Inc.Apparatus and method for forwarding incoming calls
US5621729 *7 juin 199515 avr. 1997Geophonic Networks, Inc.Receiver controlled communication system
US5629978 *16 nov. 199513 mai 1997Us West Technologies, Inc.Service delivery using broadband
US5631948 *12 janv. 199520 mai 1997Bell Atlantic Network Services, Inc.Voice mail communication with call blocking
US5640446 *1 mai 199517 juin 1997Mci CorporationSystem and method of validating special service calls having different signaling protocols
US5642407 *29 déc. 199524 juin 1997Mci CorporationSystem and method for selected audio response in a telecommunications network
US5657451 *24 janv. 199412 août 1997Telefonaktiebolaget Lm EricssonSystem for determining whether to accept new supplementary services based upon identified types of supplementary service interactions and identified supplementary service interaction criteria
US5659605 *22 juin 199419 août 1997Bell Atlantic Network Services, Inc.Method and apparatus for providing soft dial tone using office equipment designators
US5673312 *26 juil. 199630 sept. 1997Lucent Technologies Inc.Control of call features provided to a subscriber by a hierarchical telecommunication switch
US5680442 *5 déc. 199421 oct. 1997Bell Atlantic Network Services, Inc.Voice mail communication with call blocking
US5680446 *24 août 199521 oct. 1997Southwestern Bell Technology Resources, Inc.Advanced intelligent network screening
US5692033 *22 janv. 199625 nov. 1997Bell Atlantic Network Services, Inc.AIN queuing for call-back system
US5701301 *6 juin 199423 déc. 1997Bellsouth CorporationMediation of open advanced intelligent network in SS7 protocol open access environment
US5703940 *10 août 199530 déc. 1997Intervoice, Inc.Method and apparatus for delivering calling services
US5712908 *17 mai 199627 janv. 1998Unisys CorporationApparatus and method for generating call duration billing records utilizing ISUP messages in the CCS/SS7 telecommunications network
US5717746 *28 déc. 199410 févr. 1998Nec CorporationDesignated channel terminating method and apparatus
US5732130 *6 sept. 199624 mars 1998Ericsson Inc.System and method of providing enhanced subscriber services in a multi-node telecommunications network
US5757894 *9 sept. 199626 mai 1998Bell Atlantic Network Services, Inc.Virtual foreign exchange service
US5757899 *28 août 199726 mai 1998Boulware; Joni R.Call screening using subscriber specified timers and schedules
US5757903 *29 déc. 199526 mai 1998Mci CorporationFlexible direct and shared termination call processing
US57582816 juin 199526 mai 1998Bell Atlantic Network Services, Inc.Personal communications service using wireline/wireless integration
US5764744 *27 juin 19959 juin 1998Fujitsu LimitedIntelligent network call terminating method in intelligent network, and service exchange system and destination exchange system each used in intelligent network
US5802157 *13 nov. 19961 sept. 1998U S West Technologies, Inc.Method and apparatus for controlling outgoing calls on a telephone line
US5802162 *24 mars 19971 sept. 1998Lucent Technologies Inc.Method for selectively changing the call handling capacity of a telecommunications switch
US5812639 *13 nov. 199522 sept. 1998Bell Atlantic Network Services, Inc.Message communication via common signaling channel
US5822727 *21 déc. 199513 oct. 1998At&T CorpMethod for automatic speech recognition in telephony
US5844978 *14 janv. 19971 déc. 1998Bellsouth CorporationMulti-user telephone line
US5870671 *13 nov. 19959 févr. 1999Martinez; AndyTime control system for a cellular telephone
US5875238 *21 déc. 199523 févr. 1999Ericsson Inc.Transport mechanism for accounting messages within a telecommunications system
US5878127 *30 sept. 19962 mars 1999Sbc Technology Resources, Inc.Method and apparatus for facilitating remote communications access to multiple locations within a telecommunications network
US5915008 *4 oct. 199522 juin 1999Bell Atlantic Network Services, Inc.System and method for changing advanced intelligent network services from customer premises equipment
US5950126 *3 déc. 19967 sept. 1999Nokia Telecommunications OyNetwork operator controlled usage of long distance carriers
US5953663 *25 sept. 199614 sept. 1999Ericsson Inc.Rerouting an incoming call to a ported telecommunications terminal
US5958016 *13 juil. 199728 sept. 1999Bell Atlantic Network Services, Inc.Internet-web link for access to intelligent network service control
US5987111 *12 déc. 199616 nov. 1999Ameritech CorporationMethod of aggregating a plurality of network traffic
US5995602 *24 mars 199930 nov. 1999Summit Telecom Systems, Inc.Bidding for telecommunications traffic and billing for service
US5995605 *6 déc. 199630 nov. 1999Ameritech CorporationMethod and network for providing access to an information network
US5999610 *25 juin 19977 déc. 1999Telcordia Technologies, Inc.Managing feature interactions in a telecommunications system such as an intelligent network
US601197516 oct. 19974 janv. 2000Bell Atlantic Network Services, Inc.Method of personal communications service using wireline/wireless integration detecting a predetermined event during process of a call
US6016343 *20 août 199618 janv. 2000Link Usa CorporationCall-processing system and method
US6041115 *17 juil. 199721 mars 2000Telefonaktiebolaget Lm EricssonUser interaction procedure
US6088432 *23 mai 199711 juil. 2000Mci Communications CorporationMethod and system for providing immediate audio or data response billing information to a user
US6111944 *26 sept. 199529 août 2000Nokia Telecommunications OyMethod for routing information in operations and maintenance network of telephone network
US6118861 *14 août 199712 sept. 2000Nortel Networks CorporationCalling party invoked held call monitoring
US6125113 *16 août 199626 sept. 2000Bell Atlantic Network Services, Inc.Internet telephone service
US6130937 *8 mai 199710 oct. 2000Telemark Technology, Inc.System and process for automatic storage, enforcement and override of consumer do-not-call requests
US6144667 *7 août 19977 nov. 2000At&T Corp.Network-based method and apparatus for initiating and completing a telephone call via the internet
US62158589 févr. 199610 avr. 2001Bell Atlantic Network Services, Inc.Analog terminal internet access
US6222917 *13 mai 199824 avr. 2001Nortel Dasa Network Systems Gmbh & Co.Method and apparatus for providing a directory number to a call-processing device in a communications network
US62263728 déc. 19991 mai 2001Securelogix CorporationTightly integrated cooperative telecommunications firewall and scanner with distributed capabilities
US6249575 *11 déc. 199819 juin 2001Securelogix CorporationTelephony security system
US626915713 avr. 200031 juil. 2001Summit Telecom Systems, Inc.Bidding for telecommunications traffic with request for service
US62857459 févr. 19964 sept. 2001Bell Atlantic Network Services, Inc.Analog terminal internet access
US629534530 sept. 199725 sept. 2001Alcatel Usa Sourcing, Inc.Method and system for translating call processing requests
US6301350 *30 juin 19959 oct. 2001Qwest Communications International, Inc.System and method for call handling
US632094814 juin 200020 nov. 2001Securelogix CorporationTelephony security system
US6324273 *19 mars 199827 nov. 2001Ameritech CorporationMethods, systems and articles for ordering a telecommunication service
US6330315 *19 juin 199811 déc. 2001At&T Corp.Apparatus and method for routing blocked calls
US633059823 juin 199811 déc. 2001Ameritech CorporationGlobal service management system for an advanced intelligent network
US637392928 mars 200016 avr. 2002Summit Telecom, Inc.Bidding for telecommunications traffic
US640081820 nov. 19984 juin 2002Ameritech Corp.Method of routing interLATA network traffic
US643821818 avr. 199620 août 2002Robert D. FarrisInternet telephone service
US6445783 *14 juil. 19983 sept. 2002At&T Corp.System and method that provides specialized processing of communications based on automatically generated identifiers
US65942577 sept. 200015 juil. 2003At&T Corp.Network-based method and apparatus for initiating and completing a telephone call via the internet
US6606378 *25 août 199912 août 2003Sbc Technology Resources, Inc.Method and network for providing access to an information network
US6643359 *25 mai 20014 nov. 2003Qwest Communications International Inc.Data-only telephone service
US6647099 *8 juin 199911 nov. 2003Hewlett-Packard Development Company, L.P.Administrative control and security of modems
US6678368 *15 juin 200013 janv. 2004Nokia CorporationCalling subscriber validation
US668387025 juin 199827 janv. 2004Mci Communications CorporationMethod and system for multicasting call notifications
US668735328 sept. 20003 févr. 2004Securelogix CorporationSystem and method for bringing an in-line device on-line and assuming control of calls
US66906541 oct. 199810 févr. 2004Mci Communications CorporationMethod and system for multi-media collaboration between remote parties
US670096423 juil. 20022 mars 2004Securelogix CorporationEncapsulation, compression and encryption of PCM data
US6718015 *16 déc. 19986 avr. 2004International Business Machines CorporationRemote web page reader
US6724874 *17 janv. 200120 avr. 2004Sbc Technology Resources, Inc.Outgoing call screening
US673162510 févr. 19974 mai 2004Mci Communications CorporationSystem, method and article of manufacture for a call back architecture in a hybrid network with support for internet telephony
US675418118 nov. 199622 juin 2004Mci Communications CorporationSystem and method for a directory service supporting a hybrid communication system architecture
US676042017 juil. 20016 juil. 2004Securelogix CorporationTelephony security system
US676042119 oct. 20016 juil. 2004Securelogix CorporationTelephony security system
US678537214 juil. 200031 août 2004Sbc Properties, L.P.Method and apparatus for providing prepaid local telephone services in metered states
US678877322 mai 20007 sept. 2004Grayphon Networks, Inc.System and process for automatic storage, enforcement and override of consumer do-not-call requests
US6798771 *11 déc. 199628 sept. 2004Hewlett-Packard Development Company, L.P.Call setup gateway for telecommunications system
US689194019 juil. 200010 mai 2005Sbc Technology Resources, Inc.System and method for providing remote access to telecommunications services
US6914969 *18 juin 20015 juil. 2005International Business Machines CorporationService logic execution environment for telecommunications service components
US6944276 *23 janv. 200213 sept. 2005Bellsouth Intellectual Property CorporationSystem and method to detect privacy screening
US6947540 *28 févr. 200320 sept. 2005Sbc Knowledge Ventures, L.P.Method and network for providing access to an information network
US69505068 nov. 200127 sept. 2005Bellsouth Intellectual Property CorporationMethod and system for paying prepaid communications credit
US69545247 juin 200211 oct. 2005Sbc Properties, L.P.System and method for implementing and accessing call forwarding services
US6968051 *28 nov. 200022 nov. 2005Nortel Networks LimitedProgrammable feature queues
US69855685 avr. 200410 janv. 2006Sbc Technology Resources, Inc.Billing for abbreviated dialing plan service
US69995702 juil. 200114 févr. 2006Sbc Properties L.P.Methods, systems and articles for ordering a telecommunication service
US70504275 nov. 200323 mai 2006Mci Communications CorporationMethod and system for multicasting call notifications
US705443117 janv. 200130 mai 2006Sbc Technology Resources, Inc.Method and system for generating call data reports
US70760453 févr. 200511 juil. 2006Sbc Properties, L.P.System and method for implementing and accessing call forward services
US709250112 oct. 199915 août 2006Sbc Properties, L.P.Method and apparatus for providing prepaid local telephone services
US709967729 nov. 200129 août 2006Bellsouth Intellectual Property Corp.Smart call delivery GIS integration
US710316522 janv. 20045 sept. 2006Sbc Technology Resources, Inc.Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services
US711051218 juin 200319 sept. 2006Sbc Properties, L.P.Method and apparatus for providing prepaid local telephone services
US713351113 févr. 20047 nov. 2006Securelogix CorporationTelephony security system
US714589818 nov. 19965 déc. 2006Mci Communications CorporationSystem, method and article of manufacture for selecting a gateway of a hybrid communication system architecture
US715182317 sept. 200319 déc. 2006Hewlett-Packard Development Company, L.P.Determining whether a telephony call is permitted based on permission data
US7155001 *24 oct. 200126 déc. 2006Sbc Properties, L.P.System and method for restricting and monitoring telephone calls
US71647579 nov. 200416 janv. 2007Sbc Knowledge Ventures, L.P.Methods and apparatus to manage collect phone calling limits
US716755013 mai 200323 janv. 2007Southwestern Bell Telephone CompanyApparatus and method for facilitating service management of communications services in a communications network
US719407525 juin 200420 mars 2007Gryphon Networks, Inc.System and process for automatic storage, enforcement and override of consumer do-not-call requests
US720639819 févr. 200417 avr. 2007Sbc Technology Resources, Inc.System and method for forwarding call from disconnected telephone number to new telephone number
US722794019 mai 20065 juin 2007At&T Knowledge Ventures, B.P.System and method for implementing and accessing call forwarding services
US72310271 mars 200412 juin 2007Securelogix CorporationEncapsulation, compression, and encryption of PCM data
US7231029 *23 août 200112 juin 2007Bellsouth Ip CorporationOn-demand call blocking service
US724275412 mai 200310 juil. 2007At&T Labs, Inc.System and method for implementing and accessing call forwarding services
US725720721 mars 200514 août 2007Bellsouth Intellectual Property CorporationMethod and system for paying prepaid communications credit
US727478624 mars 200325 sept. 2007At&T Labs, Inc.Method and system for processing telephone calls via a remote tie-line
US72805304 mars 20029 oct. 2007Starvox Communications Inc.Apparatus and method for integrated voice gateway
US729565918 juil. 200513 nov. 2007At&T Bls Intellectual Property, Inc.Method and system for prepaid communications credit
US731778730 avr. 20028 janv. 2008At&T Knowledge Ventures, L.P.Voice enhancing for advance intelligent network services
US733722024 oct. 200126 févr. 2008At&T Labs, Inc.Unified interface for managing DSL services
US734615520 avr. 200718 mars 2008At&T Knowledge Ventures, L.P.System and method for implementing and accessing call forwarding services
US740905114 nov. 20065 août 2008At&T Intellectual Property I, L.P.Methods and apparatus to manage collect phone calling limits
US74180891 nov. 200626 août 2008At&T Intellectual Property I, L.P.System and method for restricting and monitoring telephone calls
US744055817 juin 200421 oct. 2008Securelogix CorporationTelephony security system
US74751496 déc. 20016 janv. 2009Utbk, Inc.Apparatus and method for specifying and obtaining services through an audio transmission medium
US750245728 févr. 200210 mars 2009At&T Intellectual Property I, L.P.Outbound call rules routing
US7505575 *28 août 200717 mars 2009At&T Labs, Inc.Method and system for processing telephone calls via a remote tie-line
US75191705 févr. 200814 avr. 2009Utbk, Inc.Systems and methods for arranging a call
US758085014 déc. 200125 août 2009Utbk, Inc.Apparatus and method for online advice customer relationship management
US759339624 févr. 200522 sept. 2009At&T Labs, Inc.System and method for providing remote access to telecommunications services
US765701329 oct. 20072 févr. 2010Utbk, Inc.Apparatus and method for ensuring a real-time connection between users and selected service provider using voice mail
US766409722 mars 200416 févr. 2010Verizon Services Corp.Telephone service via networking
US769818318 juin 200313 avr. 2010Utbk, Inc.Method and apparatus for prioritizing a listing of information providers
US772009110 janv. 200618 mai 2010Utbk, Inc.Systems and methods to arrange call back
US777840317 déc. 200717 août 2010At&T Intellectual Property I, L.P.System and method for implementing and accessing call forwarding services
US778284227 févr. 200624 août 2010At&T Intellectual Property I, L.P.Methods and apparatus to perform outdial communication services
US780129028 nov. 200121 sept. 2010At&T Corp.Consolidated access and administration of customized telephone calling service
US78133327 févr. 200512 oct. 2010Verizon Services Corp.Voice call alternative routing through PSTN and internet networks
US781761928 févr. 200019 oct. 2010Verizon Services Corp.Internet long distance telephone service
US783086021 mai 20039 nov. 2010Verizon Services Corp.Packet data network voice call quality monitoring
US78308678 sept. 20089 nov. 2010At&T Intellectual Property I, L.P.Methods and apparatus to authorize and allocate resources for outdial communication services
US783998819 oct. 200523 nov. 2010At&T Intellectual Property I, L.P.Methods and apparatus for data structure driven authorization and/or routing of outdial communication services
US788600920 août 20048 févr. 2011Utbk, Inc.Gate keeper
US790771421 juil. 200615 mars 2011At&T Labs, Inc.Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services
US7916847 *18 juin 200829 mars 2011At&T Intellectual Property I, LpConsolidated access and administration of customized telephone calling services
US792498719 oct. 200512 avr. 2011At&T Intellectual Property I., L.P.Methods, apparatus and data structures for managing distributed communication systems
US793743927 déc. 20013 mai 2011Utbk, Inc.Apparatus and method for scheduling live advice communication with a selected service provider
US79489682 nov. 200424 mai 2011Verizon Communications Inc.Network session management
US795750919 oct. 20077 juin 2011At&T Intellectual Property I, L.P.Voice enhancing for advance intelligent network services
US80274539 juil. 200727 sept. 2011Utbk, Inc.System and method for an online speaker patch-through
US80278983 août 200927 sept. 2011Utbk, Inc.Method and apparatus for prioritizing a listing of information providers
US80598086 juil. 201015 nov. 2011At&T Intellectual Property I, L.P.System and method for implementing and accessing call forwarding services
US807784918 janv. 200713 déc. 2011Utbk, Inc.Systems and methods to block communication calls
US809464714 juin 200110 janv. 2012Verizon Services Corp.System and method for providing requested quality of service in a hybrid network
US812593110 janv. 200628 févr. 2012Utbk, Inc.Systems and methods to provide availability indication
US8126131 *15 juin 200528 févr. 2012Alcatel LucentCall blocking based on the network access type for the called party
US813974226 sept. 200620 mars 2012At&T Intellectual Property I, L.P.Apparatus and method for facilitating service management of communications services in a communications network
US81500133 nov. 20063 avr. 2012Securelogix CorporationTelephony security system
US815529324 juil. 200810 avr. 2012At&T Intellectual Property I, L.P.System and method for restricting and monitoring telephone calls
US8238327 *19 oct. 20057 août 2012At&T Intellectual Property I, L.P.Apparatus and methods for subscriber and enterprise assignments and resource sharing
US834008619 avr. 200725 déc. 2012At&T Intellectual Property I, LpMethods and apparatus to protect and audit communication line status
US837953129 sept. 200819 févr. 2013Verizon Services Corp.Telephony communication via varied redundant networks
US83960542 mai 200812 mars 2013Utbk, LlcSystems and methods to facilitate searches of communication references
US839619829 oct. 201012 mars 2013At&T Intellectual Property I, L.P.Methods and apparatus for authorization and/or routing of outdial communication services
US843725630 janv. 20077 mai 2013Utbk, LlcSystems and methods to provide communication connections
US84941386 janv. 201123 juil. 2013At&T Intellectual Property I, L.P.Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services
US855368115 févr. 20108 oct. 2013Verizon Services Corp.Telephone service via packet-switched networking
US86817783 avr. 200725 mars 2014Ingenio LlcSystems and methods to manage privilege to speak
US868195230 mai 200825 mars 2014Ingenio LlcSystems and methods to selectively provide telephonic connections
US86877834 sept. 20121 avr. 2014Ingenio LlcSystems and methods to provide information via connections for real time communications between people
US869365128 févr. 20138 avr. 2014At&T Intellectual Property I, L.P.Methods and apparatus for authorization and/or routing of outdial communication services
US87055205 déc. 201222 avr. 2014At&T Intellectual Property I, L.P.Methods and apparatus to protect and audit communication line status
US870571817 juin 201322 avr. 2014At&T Intellectual Property I, L.P.Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services
US873115712 juin 201220 mai 2014Yellow PagesApparatus and method for ensuring a real-time connection between users and selected service provider using voice mail
US876115414 nov. 200524 juin 2014Ebbe AltbergMethods and apparatuses to access advertisements through voice over internet protocol (VoIP) applications
US883196513 nov. 20089 sept. 2014Yp Interactive LlcApparatus and method for online advice customer relationship management
US88374661 nov. 201216 sept. 2014Yp Interactive LlcSystems and methods to provide communication references based on recommendations to connect people for real time communications
US88377103 avr. 200716 sept. 2014Yp Interactive LlcSystems and methods to facilitate searches
US884339219 avr. 201323 sept. 2014Yp Interactive LlcApparatus and method for recruiting, communicating with, and paying participants of interactive advertising
US88486965 mars 201330 sept. 2014Yp Interactive LlcSystems and methods to facilitate searches of communication references
US885601422 août 20137 oct. 2014Yp Interactive LlcMethods and apparatuses for delivery of advice to mobile/wireless devices
US893788725 mars 201320 janv. 2015Yp Interactive LlcSystems and methods to provide communication connections
US893806218 juin 201220 janv. 2015Comcast Ip Holdings I, LlcMethod for accessing service resource items that are for use in a telecommunications system
US897678231 oct. 200710 mars 2015Verizon Patent And Licensing Inc.Network session management for telephony over hybrid networks
US909279311 mai 201228 juil. 2015Yellowpages.Com LlcSystems and methods to provide communication connections via partners
US909448612 juin 200728 juil. 2015Yellowpages.Com LlcMethods and apparatuses to track information via passing information during telephonic call process
US909450628 sept. 201228 juil. 2015Yellowpages.Com LlcSystems and methods to connect members of a social network for real time communication
US910035922 mai 20134 août 2015Yellowpages.Com LlcSystems and methods to facilitate real time communications between members of a social network
US91050322 mai 200811 août 2015Yellowpages.Com LlcSystems and methods to provide advertisements for real time communications
US910647328 mars 200711 août 2015Yellowpages.Com LlcSystems and methods to connect buyers and sellers
US918355924 août 200610 nov. 2015Yellowpages.Com LlcSystems and methods to convert a call generated from an advertisement
US91915056 juil. 201217 nov. 2015Comcast Cable Communications, LlcStateful home phone service
US919747924 août 200624 nov. 2015Yellowpages.Com LlcSystems and methods to manage a queue of people requesting real time communication connections
US920849516 août 20068 déc. 2015Yellowpages.Com LlcMethods and apparatuses for advertisement presentation
US92099846 févr. 20088 déc. 2015Yellowpages.Com LlcSystems and methods to facilitate communications
US921525431 oct. 200715 déc. 2015Verizon Patent And Licensing Inc.Network session management for telephony over hybrid networks
US930070321 août 201329 mars 2016Yellowpages.Com LlcSystems and methods to provide telephonic connections via concurrent calls
US932574931 janv. 200726 avr. 2016At&T Intellectual Property I, LpMethods and apparatus to manage conference call activity with internet protocol (IP) networks
US936957425 févr. 201414 juin 2016At&T Intellectual Property I, L.P.Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services
US940759419 avr. 20132 août 2016Yellowpages.Com LlcSystems and methods to facilitate real time communications and commerce via a social network
US946212123 avr. 20134 oct. 2016Yellowpages.Com LlcSystems and methods to confirm initiation of a callback
US95538513 août 201524 janv. 2017Yellowpages.Com LlcMethods and apparatuses to track information using call signaling messages
US978772811 juin 201510 oct. 2017Yellowpages.Com LlcSystems and methods to connect members of a social network for real time communication
US20010046284 *2 juil. 200129 nov. 2001Ameritech CorporationMethods, systems and articles for ordering a telecommunication service
US20020061092 *12 oct. 199923 mai 2002Samuel George MaropisMethod and apparatus for providing prepaid local telephone services
US20020136389 *17 janv. 200126 sept. 2002Sbc Technology Resources, Inc.Method and system for generating call data reports
US20020168055 *30 avr. 200214 nov. 2002Crockett Susanne MarieVoice enhancing for advance intelligent network services
US20020191772 *18 juin 200119 déc. 2002International Business Machines CorporationService logic execution environment for telecommunications service components
US20030076941 *24 oct. 200124 avr. 2003Sbc Technology Resources, Inc.System and method for restricting and monitoring telephone calls
US20030079028 *24 oct. 200124 avr. 2003Sbc Technology Resources, Inc.Unified interface for managing DSL services
US20030100319 *29 nov. 200129 mai 2003Contractor Sunil H.Smart call delivery with GIS integration
US20030228011 *7 juin 200211 déc. 2003Gibson Elizabeth GoldwynSystem and method for implementing and accessing call forwarding services
US20030235284 *24 mars 200325 déc. 2003Sbc Technology Resources Inc.Method and system for processing telephone calls via a remote tie-line
US20040005045 *12 mai 20038 janv. 2004Sbc Technology Resources, Inc., Austin, TexasSystem and method for implementing and accessing call forwarding services
US20040022379 *13 mai 20035 févr. 2004Southwestern Bell Telephone CompanyApparatus and method for facilitating service management of communications services in a communications network
US20040062368 *17 sept. 20031 avr. 2004Durkin David P.Determining whether a telephony call is permitted based on permission data
US20040125931 *5 nov. 20031 juil. 2004Michael ArcherMethod and system for multicasting call notifications
US20040151294 *22 janv. 20045 août 2004Sbc Technology Resources, Inc.Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services
US20040161086 *13 févr. 200419 août 2004Securelogix CorporationTelephony security system
US20040190696 *5 avr. 200430 sept. 2004Sbc Technology Resources, Inc.Billing for abbreviated dialing plan service
US20040218742 *1 mars 20044 nov. 2004Greg SchmidEncapsulation, compression, and encryption of PCM data
US20040234056 *17 juin 200425 nov. 2004Securelogix CorporationTelephony security system
US20040243431 *22 juin 20042 déc. 2004Penina KatzTelephone-based personnel tracking system
US20050031107 *25 juin 200410 févr. 2005Gryphon Networks CorporationSystem and process for automatic storage, enforcement and override of consumer do-not-call requests
US20050071509 *20 août 200431 mars 2005Scott FaberGate keeper
US20050163295 *21 mars 200528 juil. 2005Bellsouth Intellectual Property CorporationMethod and system for paying prepaid communications credit
US20050251413 *18 juil. 200510 nov. 2005Bellsouth Intellectual Property CorporationMethod and system for prepaid communications credit
US20050259807 *29 juil. 200524 nov. 2005Pita MadochMethod and network for providing access to an information network
US20060098796 *9 nov. 200411 mai 2006Link Michael PMethods and apparatus to manage collect phone calling limits
US20060203986 *19 mai 200614 sept. 2006Sbc Properties L.P.System and method for implementing and accessing call forwarding services
US20060277108 *16 août 20067 déc. 2006Utbk, Inc.Methods and apparatuses for advertisement presentation
US20070003049 *15 juin 20054 janv. 2007Lucent Technologies Inc.Call blocking based on the network access type for the called party
US20070047714 *21 juil. 20061 mars 2007Sbc Technology Resources, Inc.Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services
US20070081662 *14 nov. 200512 avr. 2007Utbk, Inc.Methods and apparatuses to access advertisements through voice over internet protocol (VoIP) applications
US20070086439 *27 févr. 200619 avr. 2007Marco SchneiderMethods and apparatus to perform outdial communication services
US20070115921 *19 oct. 200524 mai 2007Marco SchneiderApparatus and methods for subscriber and enterprise assignments and resource sharing
US20070115922 *19 oct. 200524 mai 2007Marco SchneiderMethods, apparatus and data structures for managing distributed communication systems
US20070116213 *13 oct. 200524 mai 2007Gruchala Carol SMethods and apparatus to detect and block unwanted fax calls
US20070116228 *19 oct. 200524 mai 2007Marco SchneiderMethods and apparatus for data structure driven authorization and/or routing of outdial communication services
US20070116234 *19 oct. 200524 mai 2007Marco SchneiderMethods and apparatus for preserving access information during call transfers
US20070121850 *26 sept. 200631 mai 2007Southwestern Bell Telephone CompanyApparatus and method for facilitating service management of communications services in a communications network
US20070121851 *4 août 200631 mai 2007Sbc Properties, L.P.Method and apparatus for providing prepaid local telephone services
US20070121858 *14 nov. 200631 mai 2007Link Michael PMethods and apparatus to manage collect phone calling limits
US20070127448 *3 nov. 20067 juin 2007Buntin David LTelephony security system
US20070160035 *30 janv. 200712 juil. 2007Utbk, Inc.Systems and Methods to Provide Communication Connections
US20070160077 *24 août 200612 juil. 2007Utbk, Inc.Systems and methods to manage a queue of people requesting real time communication connections
US20070162334 *24 août 200612 juil. 2007Utbk, Inc.Systems and methods to convert a call generated from an advertisement
US20070165804 *5 mars 200719 juil. 2007Utbk, Inc.Systems and Methods to Convert a Free Call to a Fee-Based Call
US20070165821 *18 janv. 200719 juil. 2007Utbk, Inc.Systems and Methods to Block Communication Calls
US20070174124 *19 mars 200726 juil. 2007Utbk, Inc.Methods and Apparatuses for Prioritizing Featured Listings
US20070174187 *3 nov. 200626 juil. 2007Utbk, Inc.Systems and methods to process payment
US20070189520 *3 avr. 200716 août 2007Utbk, Inc.Systems and Methods to Facilitate Transition from Communication to Commerce
US20070201659 *3 avr. 200730 août 2007Utbk, Inc.Systems and Methods to Manage Privilege to Speak
US20070206759 *1 mars 20066 sept. 2007Boyanovsky Robert MSystems, methods, and apparatus to record conference call activity
US20070217584 *21 mai 200720 sept. 2007At&T Labs, Inc.System and method for implementing and accessing call forwarding services
US20070230671 *12 juin 20074 oct. 2007Utbk, Inc.Methods and Apparatuses to Track Information via Passing Information During Telephonic Call Process
US20070230674 *13 juin 20074 oct. 2007Utbk, Inc.Systems and Methods to Convert a Free Call to a Fee-Based Call
US20070286391 *20 avr. 200713 déc. 2007At&T Knowledge Ventures, L.P.System and method for implementing and accessing call forwarding services
US20070291783 *28 mars 200720 déc. 2007Utbk, Inc.Systems and Methods to Provide Real Time Communication Connections
US20070291921 *28 août 200720 déc. 2007At&T Labs, Inc.Method and system for processing telephone calls via a remote tie-line
US20080014950 *16 juil. 200717 janv. 2008Pitsa MadochMethods of routing interlata network traffic
US20080049917 *29 oct. 200728 févr. 2008Utbk, Inc.Apparatus and Method for Ensuring a Real-Time Connection Between Users and Selected Service Provider Using Voice Mail
US20080089503 *19 oct. 200717 avr. 2008At&T Knowledge Ventures, L.P.Voice enhancing for advance intelligent network services
US20080103529 *26 oct. 20061 mai 2008Old Dominion UniversityApparatus and methods for performing cellular electro-manipulations
US20080170680 *17 déc. 200717 juil. 2008At & T Knowledge Ventures, L.P.System and method for implementing and accessing call forwarding services
US20080181140 *31 janv. 200731 juil. 2008Aaron BangorMethods and apparatus to manage conference call activity with internet protocol (ip) networks
US20080195585 *3 avr. 200714 août 2008Utbk, Inc.Systems and Methods to Facilitate Searches
US20080212756 *5 févr. 20084 sept. 2008Utbk, Inc.Systems and Methods for Arranging a Call
US20080215961 *6 févr. 20084 sept. 2008Utbk, Inc.Systems and Methods to Facilitate Communications
US20080260121 *19 avr. 200723 oct. 2008Jae-Sun ChinMethods and apparatus to protect and audit communication line status
US20080260130 *18 juin 200823 oct. 2008Creswell Carroll WConsolidated access and administration of customized telephone calling services
US20080275785 *2 mai 20086 nov. 2008Utbk, Inc.Systems and Methods to Provide advertisements for Real Time Communications
US20080279359 *24 juil. 200813 nov. 2008At&T Intellectual Property I,L.P.System and method for restricting and monitoring telephone calls
US20080310604 *30 mai 200818 déc. 2008Utbk, Inc.Systems and Methods to Selectively Provide Telephonic Connections
US20090003574 *8 sept. 20081 janv. 2009Marco SchneiderMethods and apparatus to authorize and allocate resources for outdial communication services
US20090030838 *1 oct. 200829 janv. 2009Utbk, Inc.Method, apparatus and system for marketing , delivering , and collecting payment for information
US20090037309 *28 mai 20085 févr. 2009Utbk, Inc.Systems and Methods to Convert a Real Time Communication Connection
US20090063246 *13 nov. 20085 mars 2009Utbk, Inc.Apparatus and Method for Online Advice Customer Relationship Management
US20090161856 *9 juil. 200725 juin 2009Utbk, Inc.System and method for an online speaker patch-through
US20090323670 *2 mai 200831 déc. 2009Utbk, Inc.Systems and Methods to Facilitate Searches of Communication References
US20100017266 *3 août 200921 janv. 2010Utbk, Inc.Method and Apparatus for Prioritizing a Listing of Information Providers
US20100069090 *23 nov. 200918 mars 2010At&T Intellectual Property I, L.P.Smart call delivery with gis integration
US20110044439 *29 oct. 201024 févr. 2011Marco SchneiderMethods and apparatus for authorization and/or routing of outdial communication services
US20110142213 *6 janv. 201116 juin 2011At&T Labs, Inc.Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services
EP0774874A3 *5 nov. 199623 févr. 2000AT&T Corp.Control of call features provided to a subscriber by a hierarchical telecommunication switch
EP0774875A3 *5 nov. 199617 nov. 1999AT&T Corp.Hierarchical switch support of services for subscribers based on organizational membership
EP1138144A1 *23 sept. 19994 oct. 2001Securelogix CorporationTelephony security system
EP1138144A4 *23 sept. 199912 janv. 2005Securelogix CorpTelephony security system
WO1996041450A1 *3 juin 199619 déc. 1996Geophonic Networks, Inc.Receiver controlled communication system
WO1997025807A1 *29 nov. 199617 juil. 1997Telia AbProgramming of telecommunication services by customers
WO1997046031A1 *30 mai 19974 déc. 1997Telefonaktiebolaget Lm Ericsson (Publ)An arrangement and a method for making a telephone call
WO1997050232A1 *25 juin 199731 déc. 1997Bell Communications Research, Inc.Managing feature interactions in a telecommunications system such as an intelligent network
WO1998015102A1 *30 sept. 19979 avr. 1998Sbc Technology Resources, Inc.Remote access to multiple locations within a telecommunications network
WO1998023080A2 *14 nov. 199728 mai 1998Mci Worldcom, Inc.A communication system architecture
WO1998023080A3 *14 nov. 19977 janv. 1999Mci Communications CorpA communication system architecture
WO1998025390A2 *2 déc. 199711 juin 1998Nokia Telecommunications OyNetwork operator controlled usage of long distance carriers
WO1998025390A3 *2 déc. 199723 juil. 1998Nokia Telecommunications OyNetwork operator controlled usage of long distance carriers
WO1999017562A2 *17 sept. 19988 avr. 1999Alcatel Usa Sourcing, L.P.Method and system for translating call processing requests
WO2000003534A1 *12 juil. 199920 janv. 2000Nokia Networks OyMethod and system for control of calls in a telecommunication network
WO2002058366A1 *11 janv. 200225 juil. 2002Sbc Technology Resources, Inc.Outgoing call screening
WO2002075984A1 *20 mars 200226 sept. 2002Alloptic, Inc.Point-to-multipoint optical access network with distributed central office interface capacity
WO2003009573A1 *17 juil. 200230 janv. 2003Securelogix CorporationTelephony security system
WO2003041380A1 *26 févr. 200215 mai 2003Bellsouth Intellectual Property CorporationMethod and system for prepaid communications credit
WO2003053031A1 *19 déc. 200226 juin 2003Aerotel, Ltd.Telephone call restrictor and related method of programming
Classifications
Classification aux États-Unis379/88.23, 379/230, 379/221.09, 379/88.25, 379/197, 379/93.02, 379/207.13, 379/196, 379/207.11, 379/207.03
Classification internationaleH04M3/42, H04M3/38, H04Q3/00
Classification coopérativeH04Q3/0029, H04Q2213/13541, H04Q2213/13515, H04M3/38, H04Q2213/13531, H04M3/4228, H04Q2213/13547
Classification européenneH04M3/38, H04Q3/00D3, H04M3/42N
Événements juridiques
DateCodeÉvénementDescription
20 janv. 1999FPAYFee payment
Year of fee payment: 4
23 janv. 2003FPAYFee payment
Year of fee payment: 8
25 janv. 2007FPAYFee payment
Year of fee payment: 12
18 sept. 2012ASAssignment
Effective date: 19921221
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MCCONNELL, VON K;REEL/FRAME:028976/0503
Owner name: BELL ATLANTIC NETWORK SERVICES, INC., VIRGINIA
25 avr. 2014ASAssignment
Owner name: VERIZON SERVICES CORP., VIRGINIA
Effective date: 20000801
Free format text: CHANGE OF NAME;ASSIGNOR:BELL ATLANTIC NETWORK SERVICES, INC.;REEL/FRAME:032761/0226
8 mai 2014ASAssignment
Effective date: 20140409
Owner name: VERIZON PATENT AND LICENSING INC., NEW JERSEY
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VERIZON SERVICES CORP.;REEL/FRAME:032851/0319